TECHNICAL FIELD
[0001] This application relates to the field of communication technologies, and in particular,
to a blockchain creation method and a related apparatus.
BACKGROUND
[0002] A blockchain is a distributed ledger integrating a plurality of technologies such
as a cryptography technology, a peer-to-peer (peer-to-peer, P2P) network, and a distributed
database. As an open and transparent decentralization technology, the blockchain transforms
a conventional authority center and central trust into a group consensus and decentralized
trust, and constructs the tamper-proof distributed ledger that is guaranteed by using
the cryptography technology. However, evolution of a current blockchain is independent
of network evolution. That is, the current blockchain as an independent distributed
storage bypasses a communication network, and cannot be combined with the communication
network. In addition, the communication network cannot directly create and manage
the blockchain either.
SUMMARY
[0003] This application provides a blockchain creation method and a related apparatus, to
combine a blockchain with a communication network, so that the communication network
directly manages the blockchain.
[0004] According to a first aspect, this application provides a blockchain creation method.
The method includes:
sending a first message to at least one first node, where the first message is for
configuring the first node to be a blockchain node, a type of the first node includes
at least one of the following: a terminal device, an access network device, a core
network element, an independent node, an application function node, and an edge network
node, and the terminal device, the access network device, the core network element,
the independent node, the application function node, and the edge network node are
nodes having a blockchain capability in a communication network; and
receiving a first indication message from the at least one first node, where the first
indication message indicates whether the first node is successfully configured.
[0005] In this application, a LAF may send the first message to the first node to configure
the first node to be the blockchain node. The LAF may be a new NF in a CN, or the
LAF may be deployed in a RAN. The type of the first node may be one or more of the
terminal device, the access network device, the core network element, the independent
node, the application function node, the edge network node, and the like. Therefore,
through implementation of the solution in this application, a blockchain can be combined
with the communication network, so that the communication network directly manages
the blockchain.
[0006] In a possible implementation, the method further includes:
receiving blockchain establishment requirement information from a second node; and
the sending a first message to at least one first node includes:
sending the first message to the at least one first node based on the blockchain establishment
requirement information.
[0007] In this implementation, another node (for example, the second node) having a blockchain
establishment requirement may send the blockchain establishment requirement information
to the LAF, to create or manage the blockchain by using the LAF.
[0008] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0009] In a possible implementation, the blockchain establishment requirement information
includes the policy information; and
the sending the first message to the at least one first node based on the blockchain
establishment requirement information includes:
obtaining identification information of a network element in which the first node
is located, address information of the first node, or identification information of
the first node based on the policy information; and
sending the first message to the at least one first node based on the identification
information of the network element in which the first node is located, the address
information of the first node, or the identification information of the first node.
[0010] In this implementation, a requirementer (for example, the second node) of the blockchain
creation does not need to obtain details of an infrastructure of an underlying blockchain,
but directly releases a chain establishment node policy to the LAF. The LAF automatically
identifies an underlying node satisfying the policy, to construct the blockchain.
It is simpler and easier to use for the second node. In addition, because the underlying
details are shielded from the second node, network privacy and security are improved.
[0011] In a possible implementation, the obtaining identification information of a network
element in which the first node is located, address information of the first node,
or identification information of the first node based on the policy information includes:
sending a first query request to a fourth node, where the first query request includes
the policy information; and
receiving a first response message from the fourth node, where the first response
message includes the identification information of the network element in which the
first node is located, the address information of the first node, or the identification
information of the first node.
[0012] In this implementation, after interworking with the fourth node (for example, a UDM
or a PCF), the LAF obtains the related information of the node. This can be compatible
with an existing communication network, and has higher applicability.
[0013] In a possible implementation, the blockchain establishment requirement information
includes the identification information of the first node; and
the sending the first message to the at least one first node based on the blockchain
establishment requirement information includes:
sending the first message to the at least one first node based on the identification
information of the first node.
[0014] In this implementation, the blockchain establishment requirement information directly
includes an identifier of the first node, so that the requirement is clearer. The
LAF may directly deliver the first message to the first node without performing excessive
processing. This helps improve blockchain creation or management efficiency.
[0015] In a possible implementation, the sending the first message to the at least one first
node based on the identification information of the first node includes:
obtaining the identification information of the network element in which the first
node is located or the address information of the first node based on the identification
information of the first node; and
sending the first message to the at least one first node based on the identification
information of the network element in which the first node is located or the address
information of the first node.
[0016] In this implementation, an access function and a blockchain management function (namely,
the LAF) of the first node in the network are separated because the access function
may not only be provided for the LAF to use, but also be provided for another network
element to use. Therefore, function boundaries between network elements are clearer.
In addition, compatibility corresponding to a case in which the solution is applied
to a 5G system is further improved.
[0017] In a possible implementation, the obtaining the identification information of the
network element in which the first node is located or the address information of the
first node based on the identification information of the first node includes:
sending a second query request to a fifth node, where the second query request includes
the identification information of the first node; and
receiving a second response message from the fifth node, where the second response
message includes the identification information of the network element in which the
first node is located or the address information of the first node.
[0018] In this implementation, an information management function and the blockchain management
function (namely, the LAF) of the first node in the network are separated because
the information management function may not only be provided for the LAF to use, but
also be provided for the another network element to use. Therefore, the function boundaries
between the network elements are clearer. In addition, compatibility corresponding
to a case in which the solution is applied to the 5G system is further improved.
[0019] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0020] In a possible implementation, the type of the first node is the terminal device;
and the first response message includes the identification information of the first
node, or the second response message includes the identification information of the
network element in which the first node is located or the address information of the
first node; and
the fourth node is a policy control function PCF, or the fifth node is a unified data
management UDM.
[0021] In this implementation, compatibility corresponding to a case in which the solution
is applied to the 5G system is improved.
[0022] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node, and the second response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node or the
fifth node is an operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node or the
fifth node is a network repository function NRF; or
the type of the first node is the application function node, and the fourth node or
the fifth node is a network exposure function NEF.
[0023] In this implementation, compatibility corresponding to a case in which the solution
is applied to the 5G system is improved.
[0024] In a possible implementation, the method further includes:
sending a blockchain establishment result to the second node based on the first indication
message from the at least one first node.
[0025] In this implementation, the LAF may obtain a configuration status of the first node
in real time. This helps manage a blockchain status, and can improve efficiency of
responding to the requirementer of the blockchain creation.
[0026] In a possible implementation, the sending a blockchain establishment result to the
second node based on the first indication message from the at least one first node
includes:
sending the blockchain establishment result and a blockchain establishment log to
the second node based on the first indication message from the at least one first
node, where
the blockchain establishment log includes a requirement completion status.
[0027] In this implementation, the blockchain establishment log displays details of the
configuration status of the blockchain node. This helps manage the node and obtain
more detailed information to provide the more detailed information for the requirementer
of the blockchain creation.
[0028] In a possible implementation, the first indication message includes configuration
success information or configuration failure information, and the blockchain establishment
result includes a blockchain establishment success or a blockchain establishment failure;
and
the sending a blockchain establishment result to the second node based on the first
indication message from the at least one first node includes:
sending the blockchain establishment result to the second node based on an amount
of configuration success information included in the first indication message from
the at least one first node.
[0029] In a possible implementation, if the amount of configuration success information
is greater than or equal to a first quantity threshold, the blockchain establishment
result is the blockchain establishment success; or
if the amount of configuration success information is less than a first quantity threshold,
the blockchain establishment result is the blockchain establishment failure.
[0030] In a possible implementation, the method further includes:
if the amount of configuration success information is less than the first quantity
threshold, reselecting a node satisfying a blockchain establishment requirement, and
configuring the node to be the blockchain node.
[0031] In a possible implementation, the method further includes:
receiving blockchain capability information of a plurality of nodes, where the plurality
of nodes include the at least one first node.
[0032] In this implementation, the blockchain capability information of the nodes is received,
which helps subsequently identify accurately the node satisfying the blockchain establishment
requirement.
[0033] In a possible implementation, the method further includes:
storing the blockchain capability information of the plurality of nodes; or
sending the blockchain capability information of the plurality of nodes to a sixth
node.
[0034] In this implementation, the sixth node may be a UDM, or the sixth node may be a newly
designed network element, for example, a UTDM. This is not limited herein. When the
sixth node is the UDM, compatibility of the solution in this application with the
5G system can be improved. When the sixth node is the UDM, applicability of the solution
in this application can be improved.
[0035] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0036] In this implementation, different modes are defined to better adapt to a case in
which there are many types of underlying devices and a capability difference is large
in the telecommunications network, to help improve applicability of the solution.
There are various combination manners. For example, the terminal device serves as
a client, the access network device serves as a micronode, and the core network element
and the independent node serve as full nodes. For another example, a terminal device
1 serves as a client, a terminal device 2 serves as a micronode, and the access network
device and the independent node serve as full nodes. For another example, the terminal
device serves as a client, the application function node serves as a micronode, and
the core network element and the independent node serve as full nodes.
[0037] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0038] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0039] In a possible implementation, the method further includes:
sending a second message to a third node, where the third node is a successfully configured
node in the at least one first node, and the second message is for canceling the third
node serving as the blockchain node; and
receiving a second indication message from the third node, where the second indication
message indicates whether the third node is successfully canceled.
[0040] According to a second aspect, this application provides a blockchain creation method.
The method includes:
A first node receives a first message, where the first message is for configuring
the first node to be a blockchain node, a type of the first node includes at least
one of the following: a terminal device, an access network device, a core network
element, an independent node, an application function node, and an edge network node,
and the terminal device, the access network device, the core network element, the
independent node, the application function node, and the edge network node are nodes
having a blockchain capability in a communication network.
[0041] The first node sends a first indication message, where the first indication message
indicates whether the first node is successfully configured.
[0042] In a possible implementation, the method further includes:
The first node sends blockchain capability information.
[0043] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0044] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0045] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0046] In a possible implementation, the first indication message indicates that the first
node is successfully configured; and
the method further includes:
receiving a second message, where the second message is for canceling the first node
serving as the blockchain node; and
sending a second indication message, where the second indication message indicates
whether the first node is successfully canceled.
[0047] According to a third aspect, this application provides a blockchain creation method.
The method includes:
A second node determines blockchain establishment requirement information.
[0048] The second node sends the blockchain establishment requirement information.
[0049] The second node herein is a node having a blockchain establishment requirement.
[0050] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, a type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0051] In a possible implementation, the type of the first node includes at least one of
the following:
a terminal device, an access network device, a core network element, an independent
node, an application function node, and an edge network node, where
the terminal device, the access network device, the core network element, the independent
node, the application function node, and the edge network node are nodes having a
blockchain capability in a communication network.
[0052] In a possible implementation, the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0053] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0054] In a possible implementation, the method further includes:
The second node receives a blockchain establishment result; or
the second node receives a blockchain establishment result and a blockchain establishment
log, where the blockchain establishment log includes a requirement completion status.
[0055] In a possible implementation, the blockchain establishment result includes a blockchain
establishment success or a blockchain establishment failure.
[0056] According to a fourth aspect, this application provides a blockchain creation method.
The method includes:
A fourth node receives a first query request, where the first query request includes
policy information, or the first query request includes identification information
of a first node.
[0057] The fourth node sends a first response message, where when the first query request
includes the policy information, the first response message includes identification
information of a network element in which the first node is located, address information
of the first node, or the identification information of the first node; or when the
first query request includes the identification information of the first node, the
first response message includes identification information of a network element in
which the first node is located or address information of the first node.
[0058] A type of the first node includes at least one of the following: a terminal device,
an access network device, a core network element, an independent node, an application
function node, and an edge network node, and the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node are nodes having a blockchain capability in a communication
network.
[0059] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0060] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the policy information, the first response message
includes the identification information of the first node, and the fourth node is
a policy control function PCF.
[0061] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the identification information of the first node,
the first response message includes the identification information of the network
element in which the first node is located or the address information of the first
node, and the fourth node is a unified data management UDM.
[0062] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node is an
operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node is a network
repository function NRF; or
the type of the first node is the application function node, and the fourth node is
a network exposure function NEF.
[0063] In a possible implementation, the method further includes:
The fourth node receives blockchain capability information of a plurality of nodes,
where the plurality of nodes include at least one first node, the type of the first
node includes at least one of the following: the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node, and the terminal device, the access network device, the
core network element, the independent node, the application function node, and the
edge network node are the nodes having a blockchain capability in the communication
network.
[0064] The fourth node stores the blockchain capability information of the plurality of
nodes, where the blockchain capability information is for a ledger anchor function
to determine the at least one first node.
[0065] According to a fifth aspect, this application provides a communication apparatus.
The apparatus is a ledger anchor function LAF, and the apparatus includes:
a transceiver unit, configured to send a first message to at least one first node,
where the first message is for configuring the first node to be a blockchain node,
a type of the first node includes at least one of the following: a terminal device,
an access network device, a core network element, an independent node, an application
function node, and an edge network node, and the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node are nodes having a blockchain capability in a communication
network, where
the transceiver unit is configured to receive a first indication message from the
at least one first node, where the first indication message indicates whether the
first node is successfully configured.
[0066] In a possible implementation, the transceiver unit is further configured to receive
blockchain establishment requirement information from a second node; and
the apparatus further includes a processing unit, where
when the first message is sent to the at least one first node, the processing unit
is further configured to:
send the first message to the at least one first node based on the blockchain establishment
requirement information by using the transceiver unit.
[0067] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0068] In a possible implementation, the blockchain establishment requirement information
includes the policy information; and the apparatus further includes the processing
unit, where
when the first message is sent to the at least one first node based on the blockchain
establishment requirement information, the processing unit is configured to:
obtain identification information of a network element in which the first node is
located, address information of the first node, or identification information of the
first node based on the policy information; and
send the first message to the at least one first node based on the identification
information of the network element in which the first node is located, the address
information of the first node, or the identification information of the first node
by using the transceiver unit.
[0069] In a possible implementation, when obtaining the identification information of the
network element in which the first node is located, the address information of the
first node, or the identification information of the first node based on the policy
information, the processing unit is configured to:
send a first query request to a fourth node by using the transceiver unit, where the
first query request includes the policy information; and
receive a first response message from the fourth node by using the transceiver unit,
where the first response message includes the identification information of the network
element in which the first node is located, the address information of the first node,
or the identification information of the first node.
[0070] In a possible implementation, the blockchain establishment requirement information
includes the identification information of the first node; and the apparatus further
includes the processing unit, where
when the first message is sent to the at least one first node based on the blockchain
establishment requirement information, the processing unit is configured to:
send the first message to the at least one first node based on the identification
information of the first node by using the transceiver unit.
[0071] In a possible implementation, when the first message is sent to the at least one
first node based on the identification information of the first node, the processing
unit is configured to:
obtain the identification information of the network element in which the first node
is located or the address information of the first node based on the identification
information of the first node; and
send the first message to the at least one first node based on the identification
information of the network element in which the first node is located or the address
information of the first node by using the transceiver unit.
[0072] In a possible implementation, when obtaining the identification information of the
network element in which the first node is located or the address information of the
first node based on the identification information of the first node, the processing
unit is configured to:
send a second query request to a fifth node by using the transceiver unit, where the
second query request includes the identification information of the first node; and
receive a second response message from the fifth node by using the transceiver unit,
where the second response message includes the identification information of the network
element in which the first node is located or the address information of the first
node.
[0073] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0074] In a possible implementation, the type of the first node is the terminal device;
and the first response message includes the identification information of the first
node, or the second response message includes the identification information of the
network element in which the first node is located or the address information of the
first node; and
the fourth node is a policy control function PCF, or the fifth node is a unified data
management UDM.
[0075] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node, and the second response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node or the
fifth node is an operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node or the
fifth node is a network repository function NRF; or
the type of the first node is the application function node, and the fourth node or
the fifth node is a network exposure function NEF.
[0076] In a possible implementation, the processing unit is further configured to:
send a blockchain establishment result to the second node based on the first indication
message from the at least one first node by using the transceiver unit.
[0077] In a possible implementation, when the blockchain establishment result is sent to
the second node based on the first indication message from the at least one first
node, the processing unit is further configured to:
send the blockchain establishment result and a blockchain establishment log to the
second node based on the first indication message from the at least one first node
by using the transceiver unit, where
the blockchain establishment log includes a requirement completion status.
[0078] In a possible implementation, the first indication message includes configuration
success information or configuration failure information, and the blockchain establishment
result includes a blockchain establishment success or a blockchain establishment failure;
and
when the blockchain establishment result is sent to the second node based on the first
indication message from the at least one first node, the processing unit is configured
to:
send, by using the transceiver unit, the blockchain establishment result to the second
node based on an amount of configuration success information included in the first
indication message from the at least one first node.
[0079] In a possible implementation, if the amount of configuration success information
is greater than or equal to a first quantity threshold, the blockchain establishment
result is the blockchain establishment success; or
if the amount of configuration success information is less than a first quantity threshold,
the blockchain establishment result is the blockchain establishment failure.
[0080] In a possible implementation, the processing unit is further configured to:
if the amount of configuration success information is less than the first quantity
threshold, reselect a node satisfying a blockchain establishment requirement, and
configuring the node to be the blockchain node.
[0081] In a possible implementation, the transceiver unit is further configured to:
receive blockchain capability information of a plurality of nodes, where the plurality
of nodes include the at least one first node.
[0082] In a possible implementation, the apparatus further includes a storage unit.
[0083] After the blockchain capability information of the plurality of nodes is received,
the storage unit or the transceiver unit is configured to:
the storage unit is configured to store the blockchain capability information of the
plurality of nodes; or
the transceiver unit is configured to send the blockchain capability information of
the plurality of nodes to a sixth node.
[0084] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0085] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0086] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0087] In a possible implementation, the transceiver unit is further configured to:
send a second message to a third node, where the third node is a successfully configured
node in the at least one first node, and the second message is for canceling the third
node serving as the blockchain node; and
receive a second indication message from the third node, where the second indication
message indicates whether the third node is successfully canceled.
[0088] According to a sixth aspect, this application provides a communication apparatus.
The apparatus is a first node, and the apparatus includes:
a transceiver unit, configured to receive a first message, where the first message
is for configuring the first node to be a blockchain node, a type of the first node
includes at least one of the following: a terminal device, an access network device,
a core network element, an independent node, an application function node, and an
edge network node, and the terminal device, the access network device, the core network
element, the independent node, the application function node, and the edge network
node are nodes having a blockchain capability in a communication network, where
the transceiver unit is configured to send a first indication message, where the first
indication message indicates whether the first node is successfully configured.
[0089] In a possible implementation, the transceiver unit is further configured to:
send blockchain capability information.
[0090] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0091] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0092] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smait-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0093] In a possible implementation, the first indication message indicates that the first
node is successfully configured; and
the transceiver unit is further configured to:
receive a second message, where the second message is for canceling the first node
serving as the blockchain node; and
send a second indication message, where the second indication message indicates whether
the first node is successfully canceled.
[0094] According to a seventh aspect, this application provides a communication apparatus.
The apparatus is a second node, and the apparatus includes:
a processing unit, configured to determine blockchain establishment requirement information;
and
a transceiver unit, configured to send the blockchain establishment requirement information.
[0095] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, a type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0096] In a possible implementation, the type of the first node includes at least one of
the following:
a terminal device, an access network device, a core network element, an independent
node, an application function node, and an edge network node, where
the terminal device, the access network device, the core network element, the independent
node, the application function node, and the edge network node are nodes having a
blockchain capability in a communication network.
[0097] In a possible implementation, the transceiver unit is further configured to:
receive a blockchain establishment result; or
receive a blockchain establishment result and a blockchain establishment log, where
the blockchain establishment log includes a requirement completion status.
[0098] In a possible implementation, the blockchain establishment result includes a blockchain
establishment success or a blockchain establishment failure.
[0099] In a possible implementation, the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0100] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0101] According to an eighth aspect, this application provides a communication apparatus.
The apparatus is a fourth node, and the apparatus includes:
a transceiver unit, configured to receive a first query request, where the first query
request includes policy information, or the first query request includes identification
information of a first node, where
the transceiver unit is configured to send a first response message, where when the
first query request includes the policy information, the first response message includes
identification information of a network element in which the first node is located,
address information of the first node, or the identification information of the first
node; or when the first query request includes the identification information of the
first node, the first response message includes identification information of a network
element in which the first node is located or address information of the first node.
[0102] A type of the first node includes at least one of the following: a terminal device,
an access network device, a core network element, an independent node, an application
function node, and an edge network node, and the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node are nodes having a blockchain capability in a communication
network.
[0103] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0104] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the policy information, the first response message
includes the identification information of the first node, and the fourth node is
a policy control function PCF.
[0105] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the identification information of the first node,
the first response message includes the identification information of the network
element in which the first node is located or the address information of the first
node, and the fourth node is a unified data management UDM.
[0106] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node is an
operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node is a network
repository function NRF; or
the type of the first node is the application function node, and the fourth node is
a network exposure function NEF.
[0107] In a possible implementation, the apparatus further includes a storage unit.
[0108] The transceiver unit is configured to receive blockchain capability information of
a plurality of nodes, where the plurality of nodes include at least one first node,
the type of the first node includes at least one of the following: the terminal device,
the access network device, the core network element, the independent node, the application
function node, and the edge network node, and the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node are the nodes having a blockchain capability in the communication
network.
[0109] The storage unit is configured to store the blockchain capability information of
the plurality of nodes, where the blockchain capability information is for a ledger
anchor function to determine the at least one first node.
[0110] According to a ninth aspect, this application provides a communication apparatus.
The apparatus may be a LAF. For example, the LAF may be an access network device,
a core network element, or another device, may be an apparatus in the access network
device, the core network element, or the another device, or may be an apparatus that
can be used together with the access network device, the core network element, or
the another device. The communication apparatus may alternatively be a chip system.
The communication apparatus may perform the method according to the first aspect.
A function of the communication apparatus may be implemented by using hardware, or
may be implemented by the hardware executing corresponding software. The hardware
or the software includes one or more units or modules corresponding to the foregoing
function. The unit or the module may be software and/or hardware. For operations performed
by the communication apparatus and beneficial effects, refer to the method according
to the first aspect and the beneficial effects. Repeated parts are not described again.
[0111] According to a tenth aspect, this application provides a communication apparatus.
The apparatus may be a first node (for example, the first node may be a terminal device,
an access network device, a core network element, an independent node, an application
function node, or an edge network node), may be an apparatus in the first node, or
may be an apparatus that can be used together with the first node. The communication
apparatus may alternatively be a chip system. The communication apparatus may perform
the method according to the second aspect. A function of the communication apparatus
may be implemented by using hardware, or may be implemented by the hardware executing
corresponding software. The hardware or the software includes one or more units or
modules corresponding to the foregoing function. The unit or the module may be software
and/or hardware. For operations performed by the communication apparatus and beneficial
effects, refer to the method according to the second aspect and the beneficial effects.
Repeated parts are not described again.
[0112] According to an eleventh aspect, this application provides a communication apparatus.
The apparatus may be a second node, may be an apparatus in the second node, or may
be an apparatus that can be used together with the second node. The communication
apparatus may alternatively be a chip system. The communication apparatus may perform
the method according to the third aspect. A function of the communication apparatus
may be implemented by using hardware, or may be implemented by the hardware executing
corresponding software. The hardware or the software includes one or more units or
modules corresponding to the foregoing function. The unit or the module may be software
and/or hardware. For operations performed by the communication apparatus and beneficial
effects, refer to the method according to the third aspect and the beneficial effects.
Repeated parts are not described again.
[0113] According to a twelfth aspect, this application provides a communication apparatus.
The apparatus may be a fourth node, may be an apparatus in the fourth node, or may
be an apparatus that can be used together with the fourth node. The communication
apparatus may alternatively be a chip system. The communication apparatus may perform
the method according to the fourth aspect. A function of the communication apparatus
may be implemented by using hardware, or may be implemented by the hardware executing
corresponding software. The hardware or the software includes one or more units or
modules corresponding to the foregoing function. The unit or the module may be software
and/or hardware. For operations performed by the communication apparatus and beneficial
effects, refer to the method according to the fourth aspect and the beneficial effects.
Repeated parts are not described again.
[0114] According to a thirteenth aspect, this application provides a communication apparatus.
The apparatus may be a LAF. For example, the LAF may be an access network device,
a core network element, or another device. The communication apparatus includes a
processor and a transceiver. The processor and the transceiver are configured to execute
a computer program or instructions stored in at least one memory, so that the apparatus
implements the method according to any one of the implementations of the first aspect.
Optionally, the communication apparatus may further include the memory. The processor,
the transceiver, and the memory are coupled.
[0115] According to a fourteenth aspect, this application provides a communication apparatus.
The apparatus may be a first node (for example, the first node may be a terminal device,
an access network device, a core network element, an independent node, an application
function node, or an edge network node). The communication apparatus includes a processor
and a transceiver. The processor and the transceiver are configured to execute a computer
program or instructions stored in at least one memory, so that the apparatus implements
the method according to any one of the implementations of the second aspect. Optionally,
the communication apparatus further includes the memory. The processor, the transceiver,
and the memory are coupled.
[0116] According to a fifteenth aspect, this application provides a communication apparatus.
The apparatus may be a second node. The communication apparatus includes a processor
and a transceiver. The processor and the transceiver are configured to execute a computer
program or instructions stored in at least one memory, so that the apparatus implements
the method according to any one of the implementations of the third aspect. Optionally,
the communication apparatus further includes the memory. The processor, the transceiver,
and the memory are coupled.
[0117] According to a sixteenth aspect, this application provides a communication apparatus.
The apparatus may be a core network element (for example, a fourth node, a fifth node,
or a sixth node). The communication apparatus includes a processor and a transceiver.
The processor and the transceiver are configured to execute a computer program or
instructions stored in at least one memory, so that the apparatus implements the method
according to any one of the implementations of the fourth aspect. Optionally, the
communication apparatus further includes the memory. The processor, the transceiver,
and the memory are coupled.
[0118] According to a seventeenth aspect, this application provides a computer-readable
storage medium. The storage medium stores a computer program or instructions. When
the computer program or the instructions are executed by a computer, the method according
to any one of the first aspect to the sixth aspect is implemented.
[0119] According to an eighteenth aspect, this application provides a computer program product
including instructions. The computer program product includes computer program code.
When the computer program code is run on a computer, the method according to any one
of the first aspect to the sixth aspect is implemented.
[0120] According to a nineteenth aspect, a communication system is provided. The communication
system includes a LAF and at least one first node.
[0121] The LAF sends a first message to the at least one first node, where the first message
is for configuring the first node to be a blockchain node, a type of the first node
includes at least one of the following: a terminal device, an access network device,
a core network element, an independent node, an application function node, and an
edge network node, and the terminal device, the access network device, the core network
element, the independent node, the application function node, and the edge network
node are nodes having a blockchain capability in a communication network.
[0122] The at least one first node sends a first indication message to the LAF, where the
first indication message indicates whether the first node for sending the first indication
information is successfully configured.
[0123] In a possible implementation, the communication system further includes a second
node, where
the second node is configured to send blockchain establishment requirement information
to the LAF; and
that the LAF is configured to send a first message to the at least one first node
includes:
the LAF is configured to send the first message to the at least one first node based
on the blockchain establishment requirement information.
[0124] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0125] In a possible implementation, the blockchain establishment requirement information
includes the policy information or the identification information of the first node,
and the communication system further includes a fourth node; and
that the LAF is configured to send the first message to the at least one first node
based on the blockchain establishment requirement information includes:
the LAF is configured to send a first query request to the fourth node, where the
first query request includes the policy information, or the first query request includes
the identification information of the first node;
the fourth node is configured to send a first response message to the LAF, where when
the first query request includes the policy information, the first response message
includes identification information of a network element in which the first node is
located, address information of the first node, or the identification information
of the first node; or when the first query request includes the identification information
of the first node, the first response message includes identification information
of a network element in which the first node is located or address information of
the first node; and
the LAF is configured to send the first message to the at least one first node based
on the identification information of the network element in which the first node is
located, the address information of the first node, or the identification information
of the first node.
[0126] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0127] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the policy information, the first response message
includes the identification information of the first node, and the fourth node is
a policy control function PCF.
[0128] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the identification information of the first node,
the first response message includes the identification information of the network
element in which the first node is located or the address information of the first
node, and the fourth node is a unified data management UDM.
[0129] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node is an
operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node is a network
repository function NRF; or
the type of the first node is the application function node, and the fourth node is
a network exposure function NEF.
[0130] In a possible implementation,
the LAF is configured to send a blockchain establishment result to the second node
based on the first indication message from the at least one first node; or
the LAF is configured to send a blockchain establishment result and a blockchain establishment
log to the second node based on the first indication message from the at least one
first node, where the blockchain establishment log includes a requirement completion
status.
[0131] In a possible implementation, the first indication message includes configuration
success information or configuration failure information, and the blockchain establishment
result includes a blockchain establishment success or a blockchain establishment failure;
and
that the LAF is configured to send a blockchain establishment result to the second
node based on the first indication message from the at least one first node includes:
the LAF is configured to send the blockchain establishment result to the second node
based on an amount of configuration success information included in the first indication
message from the at least one first node.
[0132] In a possible implementation, if the amount of configuration success information
is greater than or equal to a first quantity threshold, the blockchain establishment
result is the blockchain establishment success; or
if the amount of configuration success information is less than a first quantity threshold,
the blockchain establishment result is the blockchain establishment failure.
[0133] In a possible implementation, the at least one first node is further configured to:
send blockchain capability information to the LAF.
[0134] In a possible implementation, the LAF is further configured to store the blockchain
capability information; or
the LAF is further configured to send the blockchain capability information to the
fourth node; and
the fourth node stores the blockchain capability information.
[0135] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0136] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0137] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0138] In a possible implementation, the LAF is configured to send a second message to a
third node, where the third node is a successfully configured node in the at least
one first node, and the second message is for canceling the third node serving as
the blockchain node; and
the third node is configured to send a second indication message to the LAF, where
the second indication message indicates whether the third node is successfully canceled.
BRIEF DESCRIPTION OF DRAWINGS
[0139]
FIG. 1 is a diagram of an architecture of a communication system;
FIG. 2 is a diagram of an architecture of another communication system;
FIG. 3 is a diagram of a blockchain architecture according to an embodiment of this
application;
FIG. 4 is a schematic flowchart of a blockchain creation method according to an embodiment
of this application;
FIG. 5 is a schematic flowchart of a blockchain creation method according to an embodiment
of this application;
FIG. 6 is a schematic flowchart of another blockchain creation method according to
an embodiment of this application;
FIG. 7A and FIG. 7B are a diagram of an establishment process of a blockchain comprising
a plurality of types of nodes according to an embodiment of this application;
FIG. 8A and FIG. 8B are another diagram of an establishment process of a blockchain
comprising a plurality of types of nodes according to an embodiment of this application;
FIG. 9 is a diagram of a structure of a communication apparatus according to an embodiment
of this application; and
FIG. 10 is a diagram of a structure of another communication apparatus according to
an embodiment of this application.
DESCRIPTION OF EMBODIMENTS
[0140] The following further describes specific embodiments of this application in detail
with reference to accompanying drawings.
[0141] The terms such as "first" and "second" in the specification, the claims, and the
accompanying drawings of this application are for distinguishing between different
objects, but are for describing a specific sequence. In addition, the terms "include",
"have", and any variant thereof are intended to cover non-exclusive inclusion. For
example, a process, a method, a system, a product, or a device that includes a series
of steps or units is not limited to the listed steps or units, but optionally further
includes an unlisted step or unit, or optionally further includes another inherent
step or unit of the process, the method, the product, or the device.
[0142] An "embodiment" mentioned in the specification indicates that a particular feature,
structure, or characteristic described with reference to this embodiment may be included
in at least one embodiment of this application. The phrase shown in various locations
in the specification may not necessarily refer to a same embodiment, and is not an
independent or alternative embodiment exclusive from another embodiment. It is explicitly
and implicitly understood by persons skilled in the art that embodiments described
in the specification may be combined with another embodiment.
[0143] In this application, "at least one" means one or more, "a plurality of" means two
or more, "at least two" means two or three or more. "And/or" is for describing an
association relationship between associated objects, and indicates that three relationships
may exist. For example, "A and/or B" may indicate the following three cases: Only
A exists, only B exists, and both A and B exist, where A and B may be singular or
plural. The character "/" usually indicates an "or" relationship between the associated
objects. "At least one of the following" or a similar expression thereof indicates
any combination of these items, including a single item or any combination of a plurality
of items. For example, at least one of a, b, or c may indicate a, b, c, "a and b",
"a and c", "b and c", or "a, b, and c", where a, b, and c may be singular or plural.
[0144] To better understand embodiments of this application, the following first describes
a system architecture in embodiments of this application.
[0145] The technical solutions in embodiments of this application may be applied to various
communication systems, for example, a long term evolution (long term evolution, LTE)
system, an LTE frequency division duplex (frequency division duplex, FDD) system,
an LTE time division duplex (time division duplex, TDD) system, a 5th generation (5th
generation, 5G) system such as a new radio (new radio, NR) system, a system evolved
after 5G such as a 6th generation (6th generation, 6G) system, and a wireless local
area network (Wireless Local Area Network, WLAN). This is not limited herein.
[0146] FIG. 1 is a diagram of an architecture of a communication system. As shown in FIG.
1, a terminal device may access a wireless network to communicate with another device
through the wireless network. For example, the terminal device may communicate with
another terminal device. The wireless network includes a (radio) access network ((radio)
access network, (R)AN) and a core network (core network, CN). The (R)AN (described
as a RAN below) is for enabling the terminal device to access the wireless network,
and the CN is for managing the terminal device. The following separately describes
in detail the terminal device, the RAN, and the CN in the system architecture in FIG.
1.
I. Terminal device
[0147] The terminal device includes a device that provides voice and/or data connectivity
for a user. For example, the terminal device is a device that has a wireless transceiver
function, and may be deployed on land, where the deployment includes indoor, outdoor,
handheld, wearable, or vehicle-mounted deployment; may be deployed on water (for example,
on a ship); or may be deployed in the air (for example, on an airplane, a balloon,
or a satellite). The terminal device may be a mobile phone (mobile phone), a tablet
computer (Pad), a computer having a wireless transceiver function, a virtual reality
(virtual reality, VR) terminal, an augmented reality (augmented reality, AR) terminal,
a wireless terminal in industrial control (industrial control), a vehicle-mounted
terminal, a wireless terminal in self driving (self driving), a wireless terminal
in telemedicine (remote medical), a wireless terminal in a smart grid (smart grid),
a wireless terminal in transportation safety (transportation safety), a wireless terminal
in a smart city (smart city), a wireless terminal in a smart home (smart home), a
wearable terminal, or the like. An application scenario is not limited in embodiments
of this application. The terminal device may also be sometimes referred to as a terminal,
user equipment (user equipment, UE), an access terminal, a vehicle-mounted terminal,
a terminal in the industrial control, a UE unit, a UE station, a mobile station, a
remote station, a remote terminal, a mobile device, a UE terminal, a wireless communication
device, a UE proxy, a UE apparatus, or the like. The terminal may alternatively be
fixed or movable. It may be understood that all or some functions of the terminal
in this application may alternatively be implemented by using a software function
running on hardware, or may be implemented by using an instantiated virtualization
function on a platform (for example, a cloud platform).
II. RAN
[0148] The RAN may include one or more RAN devices (in other words, access network devices),
and an interface between the access network device and the terminal device may be
a Uu interface (also referred to as an air interface). Certainly, in communication
evolved after 5G, names of these interfaces may remain unchanged, or may be replaced
with other names. This is not limited in this application.
[0149] The access network device is a node or a device that enables the terminal device
to access the wireless network. The access network device includes, for example, but
is not limited to, a next generation NodeB (next generation NodeB, gNB) in a 5G communication
system, an evolved NodeB (evolved NodeB, eNB), a next generation evolved NodeB (next
generation eNB, ng-eNB), a radio backhaul device, a radio network controller (radio
network controller, RNC), a NodeB (NodeB, NB), a home base station (home evolved NodeB
(HeNB) or home NodeB (HNB)), a baseband unit (baseband unit, BBU), a transmitting
and receiving point (transmitting and receiving point, TRP), a transmitting point
(transmitting point, TP), a mobile switching center, or a device that functions as
a base station in device-to-device (Device-to-Device, D2D), vehicle-to-everything
(vehicle-to-everything, V2X), or machine-to-machine (machine-to-machine, M2M) communication;
or may include a central unit (central unit, CU) and a distributed unit (distributed
unit, DU) in a cloud radio access network (cloud radio access network, C-RAN) system,
a network device that is in a non-terrestrial network (non-terrestrial network, NTN)
communication system, that is, may be deployed on a high-altitude platform or a satellite,
or the like. This is not specifically limited in embodiments of this application.
III. CN
[0150] The CN may include one or more CN devices (which may also be understood as a network
element device, a function network element, a network function (network function,
NF), or the like, and is not limited herein).
[0151] FIG. 2 is a diagram of an architecture of another communication system. The communication
system is a system architecture in a 5G non-roaming scenario. As shown in FIG. 2,
the communication system includes the following network functions and entities: a
network slice selection function (network slice selection function, NSSF), a network
exposure function (network exposure function, NEF), a network repository function
(network function repository function, NRF), a policy control function (policy control
function, PCF), a unified data management (unified data management, UDM), an application
function (application function, AF), an authentication server function (authentication
server function, AUSF), an access and mobility management function (access and mobility
management function, AMF), a session management function (session management function,
SMF), UE, and a (radio) access network ((radio) access network, (R)AN), a user plane
function (user plane function, UPF), and a data network (data network, DN).
- 1. User plane network element: The user plane network element serves as an interface
to the data network, and completes functions such as user plane data forwarding, session/flow
level-based charging statistics collection, and bandwidth throttling, that is, packet
routing and forwarding, quality of service (quality of service, QoS) handling for
user plane data, and the like.
In the 5G communication system, the user plane network element may be a UPF network
element.
- 2. Authentication server: The authentication server performs security authentication
on a user. In the 5G communication system, the authentication server may be an AUSF
network element.
- 3. Mobility management network element: The mobility management network element is
mainly configured to perform mobility management, access management, and the like.
In the 5G communication system, an access management network element may be an AMF
network element, and mainly performs functions such as mobility management and access
authentication/authorization. In addition, the access management network element is
further responsible for transferring a user policy between a terminal and a PCF network
element.
- 4. Session management network element: The session management network element is mainly
for session management, assignment and management of an internet protocol (internet
protocol, IP) address of the user equipment, selection and control of a user plane
function, termination of interfaces toward policy control and charging functions,
downlink data notification, and the like.
In the 5G communication system, the session management network element may be an SMF
network element, and completes assignment of an IP address of the terminal, UPF selection,
charging and QoS policy control, and the like.
- 5. Application network element: In the 5G communication system, the application network
element may be an AF network element, represents an application function of a third
party or an operator, is an interface for obtaining external application data in a
5G network, and is mainly configured to transfer a requirement of an application side
for a network side.
- 6. Unified data management network element: The unified data management network element
is responsible for management of a user identifier, subscription data, and authentication
data, and registration management of a serving network element of the user. In the
5G communication system, the unified data management network element may be a UDM
network element.
- 7. Policy control network element: The policy control network element includes a user
subscription data management function, a policy control function, a charging policy
control function, quality of service (quality of service, QoS) control, and the like,
is configured to: provide a unified policy framework for governing network behavior,
provide policy rule information for a control plane function network element (for
example, the AMF or SMF network element), and so on.
In the 5G communication system, the policy control network element may be the PCF.
- 8. Network function repository function network element: The network function repository
function network element provides a storage function and a selection function of network
functional entity information for another core network element. In the 5G communication
system, the network element may be an NRF network element.
- 9. Network exposure network element: In the 5G communication system, the network exposure
network element may be a NEF network element, is mainly configured to expose a service
and a capability of a 3GPP network function to the AF, and may also enable the AF
to provide information for the 3GPP network function.
- 10. Network slice selection function network element: The network slice selection
function network element is responsible for selecting a network slice for the UE.
In the 5G communication system, the application network element may be an NSSF network
element.
[0152] The foregoing function network element may be a network element in a hardware device,
a software function running on dedicated hardware, or a virtualization function instantiated
on a platform (for example, a cloud platform). One or more services may be obtained
through division based on the foregoing function network element. Further, a service
independent of a network function may exist. In this application, an instance of the
foregoing function network element, an instance of the service included in the foregoing
function network element, or an instance of the service independent of the network
function may be referred to as a service instance.
[0153] In addition, although not shown, the CN may further include another possible network
element, for example, a service communication proxy (service communication proxy,
SCP), a network slice admission control function (network slice admission control
function, NSACF) network element, or a unified data repository (unified data repository,
UDR) network element.
[0154] It should be learned that, in the 5G communication system, function network elements
may have names of the function network elements shown in FIG. 2. In a communication
system (for example, a 6G communication system) evolved after 5G, function network
elements may still have the names of the function network elements shown in FIG. 2,
or may have other names. For example, in the 5G communication system, the policy control
network element may be the PCF. In the communication system (for example, 6G communication
system) evolved after 5G, the policy control function may still be the PCF, or may
have another name. This is not limited in this application.
[0155] Nnssf is a service-oriented interface provided by the NSSF, Nnef is a service-oriented
interface provided by the NEF, Nnrf is a service-oriented interface provided by the
NRF, Npcf is a service-oriented interface provided by the PCF, Nudm is a service-oriented
interface provided by the UDM, Naf is a service-oriented interface provided by the
AF, Nausf is a service-oriented interface provided by the AUSF, Namf is a service-oriented
interface provided by the AMF, Nsmf is a service-oriented interface provided by the
SMF, N1 is a reference point between the UE and the AMF, N2 is a reference point between
the (R)AN and the AMF, N3 is a reference point between the (R)AN and the UPF, N4 is
a reference point between the SMF and the UPF, N6 is a reference point between the
UPF and the DN, and N9 is a reference point between UPFs. It should be noted that,
for meanings of Nnssf, Nnef, Nnrf, Npcf, Nudm, Naf, Nausf, Namf, Nsmf, N1, N2, N3,
N4, N6, and N9 in FIG. 2, refer to meanings defined in a related standard protocol.
This is not limited herein.
[0156] It should be noted that the communication systems (for example, the communication
systems shown in FIG. 1 and FIG. 2) described in embodiments of this application may
also be described as telecommunications networks, communication networks, or the like.
This is not limited herein.
[0157] It should be noted that a name of a network element or a node in this application
may also be referred to as another name. This is not limited herein. It should be
noted that a new network element or a newly designed network element described in
this application may be an entirely new network element, may be an extension, update,
addition, or the like of a function of an existing network element, or may be a combination,
integration, or the like of functions of a plurality of existing network elements.
This is not limited herein.
[0158] It should be noted that a fourth node, a fifth node, and a sixth node described in
embodiments of this application may be same network elements, or may be different
network elements. This is specifically determined based on an actual scenario, and
is not limited herein.
[0159] For example, when a type of a first node is a terminal device, and blockchain establishment
requirement information includes policy information, the fourth node and the fifth
node are different network elements. Specifically, the fourth node may be a PCF, and
the fifth node may be a UDM.
[0160] For another example, when a type of a first node is an access network device, the
fourth node, the fifth node, and the sixth node may be the same network elements,
for example, OAMs.
[0161] For another example, when a type of a first node is a core network element, the fourth
node, the fifth node, and the sixth node may be the same network elements, for example,
NRFs.
[0162] For another example, when a type of a first node is an application function node,
the fourth node, the fifth node, and the sixth node may be the same network elements,
for example, NEFs.
[0163] It should be noted that the node (for example, the first node, a second node, the
fourth node, the fifth node, or the sixth node) in embodiments of this application
may be a device, a chip, a network function, or the like. This is not limited herein.
[0164] To facilitate understanding of related content in embodiments of this application,
the following describes some knowledge needed in the solutions in this application.
It should be noted that these explanations are intended to facilitate understanding
of embodiments of this application, but should not be considered as a limitation on
the protection scope claimed in this application.
1. Ledger
[0165] The ledger is a technology for sharing, replicating, or synchronizing data between
nodes by using a consensus mechanism. A blockchain (blockchain, BC) is one of ledger
technologies. Based on the ledger, a tamper-proof technology guaranteed by using a
cryptography mechanism is further added in the blockchain. Generally, a blockchain
node may run on a physical node, or may run in a virtual environment of the physical
node. The physical node herein is the first node in this application. It may be understood
that, in addition to being applicable to blockchain creation, this application may
further be extended to ledger creation. Alternatively, another name subsequently replaces
the two names: the blockchain and the ledger. This is not limited herein.
2. Ledger anchor function (ledger anchor function, LAF)
[0166] The LAF in this application may be a new NF in a core network (that is, deployed
in the core network), the LAF may be deployed in a RAN, or the LAF may be deployed
in a network element or a device beyond the core network and the RAN. This is not
limited herein. The LAF may be configured to perform blockchain-related work in a
telecommunications network. For example, the LAF is responsible for management of
a life cycle of the blockchain, where the management includes, for example, blockchain
deployment and access control. It may be understood that, in this application, a network
element configured to perform the blockchain-related work in the telecommunications
network may alternatively not be limited to being named the LAF, or may have another
name. This is specifically determined based on an actual scenario, and is not limited
herein. For ease of description, the following mainly uses the LAF as an example for
description. Optionally, the LAF may alternatively be a device, a chip, or the like.
This is not limited herein.
3. Independent node (independent node, INN)
[0167] The INN in this application is a node that is deployed in a communication network
and that has a blockchain capability. In other words, the independent node is a node
that may be deployed at any location in the telecommunications network and that has
the blockchain capability. The independent node complies with a protocol stack of
the telecommunications network, and accepts unified management and scheduling performed
by the telecommunications network, but is not bound to a communication node, for example,
a terminal device, an access network device, or a core network device, in form. It
should be noted that, in this application, the node that may be deployed at the any
location in the telecommunications network and that has the blockchain capability
may alternatively not be limited to being named a LAF, or may have another name. This
is specifically determined based on an actual scenario, and is not limited herein.
For ease of description, the following mainly uses the independent node as an example
for description.
[0168] For example, when the independent node is deployed in the terminal device, the independent
node complies with a protocol stack of the terminal device; when the independent node
is deployed in the RAN, the independent node complies with a protocol stack of the
RAN; or when the independent node is deployed in the core network, the independent
node complies with a protocol stack of an NF.
[0169] For another example, the independent node may alternatively be a software-hardware
integrated server designed for a blockchain technology, namely, a blockchain all-in-one
machine.
[0170] For another example, in some scenarios with a high performance requirement on the
blockchain, for example, when a high throughput, high computing, and/or a capability
of supporting a plurality of consensus algorithms that are/is of the blockchain are/is
needed, an independent node deployed in the RAN may be started when a blockchain node
integrated into the RAN cannot satisfy a performance requirement, where the independent
node complies with a protocol stack of the RAN to perform communication, and may provide
a high-performance blockchain capability.
4. AF node and edge network node
[0171] A node corresponding to an AF is the AF node. The AF node in this application is
a node having a blockchain capability. It may be understood that an objective of interaction
between the AF and a 5G core network is to provide a service. According to an operator
deployment policy, a trusted AF may directly access an internal network function of
the 5G core network to improve service processing efficiency, or may exchange information
with the corresponding internal network function via a NEF. In other words, in this
application, in addition to being deployed in an internal network element in the telecommunications
network, the blockchain node may further be extended to the AF, to be applicable to
a scenario in which participation of the AF is needed.
[0172] The edge network node is a node used in edge computing. The edge computing is computing
performed at or near a physical location of a user or a data source, so that a delay
can be reduced, and bandwidth can be saved. The edge network node belongs to the communication
network.
5. Blockchain structure
[0173] The blockchain structure includes a single chain, a parallel chain, a shard, a directed
acyclic graph (directed acyclic graph, DAG), and the like. This is not limited herein.
6. Block structure
[0174] The block structure is content and a data structure inside a block.
7. Consensus mechanism
[0175] In a decentralized ledger/blockchain technology, the consensus mechanism refers to
a process of agreeing on a network/data/transaction status in a decentralized manner,
and is also referred to as the consensus algorithm. The consensus mechanism includes
a proof-of-work (proof-of-work, PoW) mechanism, a proof-of-stake (proof-of-stake,
PoS) mechanism, delegated proof of stake (delegated proof of stake, DPOS), reliable,
replicated, redundant, and fault-tolerant (reliable, replicated, redundant, and fault-tolerant,
RAFT), practical Byzantine fault tolerance (practical byzantine fault tolerance, PBFT),
and the like. This is not limited herein.
8. Trusted execution environment (trusted execution environment, TEE)
[0176] The TEE is a secure area constructed in a central processing unit by using a software-hardware
method, to ensure that a program and data loaded in the TEE are protected in terms
of confidentiality and integrity.
9. Access control policy for the blockchain
[0177] The access control policy for the blockchain includes LAF authorization, LAF access
control, LAF transparent transmission, and LAF proxy.
[0178] LAF authorization: The LAF performs authorization by using an authorization code.
For example, when an entity A accesses the blockchain, A sends an authentication request
to the LAF. After performing authentication, the LAF issues the authorization code
to A, to indicate an authorization range and an authorization validity period. A holds
the authorization code to access the blockchain. The blockchain verifies the authorization
code, and accepts the access of A.
[0179] LAF access control: The LAF performs access control. For example, the LAF directly
verifies A, and A may directly access the blockchain after the verification succeeds.
The LAF performs verification at each time of request.
[0180] LAF transparent transmission: The LAF performs transparent transmission of an access
request, and a ledger node performs access control. For example, the LAF does not
perform processing, and directly forwards a request of A to the blockchain, and the
blockchain node performs access control.
[0181] LAF proxy: The LAF performs a proxy service, and provides access data. For example,
A submits the request to the LAF. After verification performed by the LAF succeeds,
the LAF obtains the access data from the chain, and then replies to A with the access
data.
10. Configuration information corresponding to a node
[0182] The configuration information corresponding to the node may be understood as a requirement
configuration of the blockchain for the node to report a transaction. For example,
the configuration information for the node may be a configuration of a trigger condition
of transaction reporting, and the trigger condition may be time-based triggering,
frequency-based triggering, or condition-based triggering. The time-based triggering
means that the transaction is generated based on a time interval, and is reported
to the blockchain. For example, the terminal device/a base station is configured to
periodically report environment perception information, or the NF is configured to
periodically report the network status. The frequency-based triggering means that
a configuration is that information reporting is performed once every n times an event
occurs, where n is an integer greater than 0. The condition-based triggering means
reporting is performed when a condition is satisfied. For example, each time the terminal
device accesses an AMF, the transaction is generated and reported. For another example,
when network traffic reaches a threshold, the transaction is generated and reported.
11. Mode supported by the node.
[0183] In this application, the mode supported by the node includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode.
[0184] A node in client mode is configured to generate the transaction or a transaction
proposal. The transaction proposal is transaction content pre-executed by a client.
For example, A transfers CNY X to B. The transaction is a state that is of the client
and that is after the transaction proposal is executed. For example, A and B initially
correspond to CNY 10. A transfers CNY 1 to B. After the transaction is executed, A=CNY
9, and B=CNY 11.
[0185] A node in micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: ① verifying the transaction or the transaction proposal;
② executing the transaction proposal to generate the transaction; and ③ generating
a microblock based on the transaction. The verifying the transaction or the transaction
proposal means verifying a signature and integrity of the transaction or the transaction
proposal, and verifying transaction content. The microblock is a block generated in
the following manner: After receiving the transaction sent by the client, the micronode
verifies validity of the transaction. The micronode generates a transaction tree by
performing Merkle processing (not necessarily the Merkle processing) on a transaction
on which the verification succeeds, and generates the block by endorsing the transaction
tree (the micronode signs the transaction tree).
[0186] A node in light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: ① verifying the transaction
or the transaction proposal; ② executing the transaction proposal to generate the
transaction; and ③ reaching a consensus on the transaction or the microblock, and
generating a complete block based on the transaction or the microblock. The complete
block is a full block generated in the following manner: A full node/light node receives
the microblock sent by the micronode, does not verify a single transaction anymore,
only needs to verify a result of endorsing the single transaction by the microblock,
performs Merkle processing on a plurality of microblocks, and then encapsulates a
plurality of microblocks obtained through the Merkle processing into one block, to
generate the full block.
[0187] A node in full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
12. Capability of the node
[0188] The capability of the node includes one or more capabilities such as a smart-contract
deployment capability, a smart-contract invoking capability, a smart-contract execution
capability, a transaction reporting capability, a transaction querying capability,
a transaction execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0189] The smart-contract deployment capability means that the node can install a program
of a smart contract.
[0190] The smart-contract invoking capability means that the node can invoke the program
of the smart contract.
[0191] The smart-contract execution capability means that the node can execute the program
of the smart contract, and provide a computing resource and a running environment
for execution of the smart contract.
[0192] The transaction reporting capability means that the node can generate a transaction,
and send the transaction to the node, where the node may be the full node, the micronode,
or the light node.
[0193] The transaction querying capability means that the node can query the blockchain
for a related transaction by using a keyword, for example, a transaction ID, a transaction
hash, a transaction party ID, or transaction content.
[0194] The transaction execution capability means that the node can execute a transaction,
and obtain a status that is of a transaction party and that is after the transaction
is executed.
[0195] The block querying capability means that the node can query the blockchain for the
related transaction by using a keyword, for example, a block height, a block hash,
or block content. The block height is a sequence number of the block on the chain.
[0196] The computing capability is a computing processing capability of the blockchain node,
for example, the central processing unit (central processing unit, CPU), a graphics
processing unit (graphics processing unit, GPU), or a storage status.
[0197] The storage capability refers to a size of hard disk space.
[0198] The network capability refers to network bandwidth.
[0199] The security algorithm capability refers to an algorithm supported by the node.
[0200] The trusted-execution-environment provision capability means that the node is capable
of providing a trusted execution environment for deployment, invoking, and execution
of the smart contract or running of the blockchain.
[0201] The consensus capability refers to a consensus algorithm supported by the node.
13. Smart contract
[0202] The smart contract refers to a protocol that can be for automatically executing a
task that originally can be completed only manually. The smart contract is any protocol
that can be for automatically executing some functions, for example, a contract that
can be for automatically calculating an amount of money to be paid by a contracting
party and arranging payment of the money.
[0203] It should be noted that, in a communication system, the blockchain may be used in
a plurality of scenarios, for example:
Scenario 1: The blockchain in the telecommunications network needs UE/the access network
device (for example, the base station) to report information such as an environment,
a key performance indicator (key performance indicator, KPI), and surveying and mapping,
including:
KPI indicator data information generated by various types of actual operation in a
conventional network, where the KPI indicator data information is mainly collected
locally by the base station, then directly reported to a local subnetwork management
and database system through a private interface, and next reported to a higher-level
network management and data center through hierarchical summary statistics; and the
UE may report various network KPI data in real time by using the blockchain technology.
[0204] Alternatively, a new service needs a large amount of surveying-and-mapping data of
a user. For example, a sensor of a tested automobile usually captures images and information
of another automobile, a pedestrian, a bicycle, a traffic sign, a traffic light, a
roadside, a lane, another infrastructure, and a road landscape. In an IoT network,
environment humidity, an environment temperature, an environment condition, and the
like are surveyed and mapped. The network may record and store the surveying-and-mapping
data by using the blockchain.
[0205] Scenario 2: The blockchain in the telecommunications network may alternatively be
for recording various dynamic data of a network element.
[0206] For example, an operator has service data of the terminal, for example, user profile
information (namely, information subscribed to by the user with the operator when
the user accesses a network), location information, identification (Identification,
ID) information, public land mobile network (public land mobile network, PLMN) information,
and service information. The blockchain may provide personal information (for example,
a trip during an epidemic) related to the user for the user to use.
[0207] Scenario 3: Data on the blockchain in the telecommunications network may alternatively
be provided for UE, the RAN, the CN, an application function (namely, a third-party
application), and the like as a service.
[0208] However, implementation of the foregoing scenarios needs the telecommunications network
to have a complete management architecture and method for blockchain capabilities,
and blockchain construction and deployment of various entities (for example, the UE,
the RAN, and the CN) in the telecommunications network. However, evolution of a current
blockchain is independent of network evolution. That is, the current blockchain bypasses
the communication network as an independent distributed storage, and cannot be combined
with the communication network. In addition, the communication network cannot directly
manage and configure the blockchain either.
[0209] Based on this, embodiments of this application provide a blockchain creation method,
to combine a blockchain with a communication network.
[0210] Before the blockchain creation method provided in this application is described,
a blockchain architecture to which this application is applicable is first described
by using an example.
[0211] FIG. 3 is a diagram of a blockchain architecture according to an embodiment of this
application. As shown in FIG. 3, the blockchain architecture in this application is
mainly divided into three layers.
- 1. An application (Ledger application, LP) layer is an upper-layer service for which
a blockchain needs to be deployed in a communication network.
- 2. A service (Ledger Service, LS) layer is for providing a blockchain as a service
(blockchain as a service, BAAS) service for the upper-layer service, shielding details
of an infrastructure layer, and managing a node at the infrastructure layer. The service
layer includes a LAF, and the LAF may interact with another NF.
- 3. The infrastructure (Ledger Infrastructure, LI) layer mainly includes UE, a RAN,
an NF, an AF, an INN, an edge network node (not shown in the figure), and the like,
and is for providing different levels of blockchain capabilities, accepting a configuration
of the service layer, and constructing the blockchain. BC enablers identify that nodes
(for example, the UE, the RAN, the NF, the AF, and the INN) have blockchain capabilities.
[0212] It should be noted that FIG. 3 is merely an example for description. The blockchain
architecture is not limited in this application.
[0213] The following describes in detail the blockchain creation method and a communication
apparatus provided in this application.
[0214] FIG. 4 is a schematic flowchart of a blockchain creation method according to an embodiment
of this application. As shown in FIG. 4, the blockchain creation method includes the
following steps S401 and S402.
[0215] S401: A LAF sends a first message to at least one first node.
[0216] In some feasible implementations, the LAF sends the first message to the at least
one first node, where the first message is for configuring the first node to be a
blockchain node, it is understood as that the first message indicates the first node
to be the blockchain node, or it is as understood as that the first message is for
activating the first node to be the blockchain node. It should be noted that, the
configuring the first node to be a blockchain node may be understood as configuring
the first node to be a node in a newly established blockchain when the new blockchain
is established. Optionally, the configuring the first node to be a blockchain node
may alternatively be understood as adding, based on an established blockchain, the
first node to be a node in the blockchain. That is, the existing blockchain is managed
or maintained. Generally, configuration information included in first messages corresponding
to different first nodes is different.
[0217] It may be understood that a type of the first node in this application may be one
or more of a terminal device, an access network device, a core network element, an
independent node, an application function node, an edge network node, and the like.
The terminal device, the access network device, the core network element, the independent
node, the application function node, and the edge network node are nodes having a
blockchain capability in a communication network.
[0218] It may be understood that, in this embodiment of this application, the first messages
corresponding to the different first nodes are usually different. Optionally, a first
message corresponding to any first node may include configuration information for
the first node. For example, the configuration information may include a configuration
for the first node to report a transaction. For example, when transaction reporting
is triggered in a condition-based manner, the configuration information is for configuring
a specific transaction condition. For another example, after the first node is activated/triggered/indicated
to be the blockchain node, some information about another communication node corresponding
to the first node needs to be configured because the blockchain node needs to communicate
with the another communication node. Therefore, the another communication node needs
to be configured.
[0219] Optionally, that a LAF sends a first message to at least one first node may be understood
as that the LAF sends the first message to the at least one first node based on blockchain
establishment requirement information. Understanding of that the LAF sends the first
message to the at least one first node based on blockchain establishment requirement
information is described in detail below. Details are not described herein.
[0220] The blockchain establishment requirement information may be generated by the LAF.
That is, when the LAF has a blockchain establishment requirement, the LAF may determine
blockchain establishment requirement information of the LAF, and determine the at
least one first node based on the blockchain establishment requirement information.
Alternatively, the blockchain establishment requirement information may be generated
and sent to the LAF by another node (for ease of description, a second node is used
as an example for description subsequently). Therefore, the LAF may determine the
at least one first node based on the blockchain establishment requirement information
received from the second node. The second node herein is a node having a blockchain
establishment requirement. For example, the second node may be a management plane,
a management node, or an administrator of an operator. For another example, the second
node may be another service layer or a user, for example, a data service node, a vehicle-to-everything
node, a vertical industry user, or a terminal user. This is not limited herein.
[0221] Generally, the blockchain establishment requirement information includes one or more
of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0222] A capability of the any first node includes one or more of the following capabilities:
a smart-contract deployment capability, a smart-contract invoking capability, a smart-contract
execution capability, a transaction reporting capability, a transaction querying capability,
a transaction execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, a consensus capability, and the like.
[0223] A mode supported by the any first node may include a client mode, a micronode mode,
a light-node mode, and a full-node mode. Generally, one first node supports only one
mode in one blockchain; and modes supported by a same first node in different blockchains
may be the same, or may be different. This is not limited herein.
[0224] The quantity of first nodes may be understood as a total quantity of first nodes
included in the blockchain, the quantity of first nodes may be understood as a minimum
quantity of first nodes that need to be included in the blockchain, or the like. This
is not limited herein.
[0225] The policy information may be understood as information for determining the blockchain
node. That is, a first node corresponding to an identifier is not directly specified,
and there are some condition constraints. The condition constraints may be for determining
the first node.
[0226] For example, for the terminal device, policy information of the terminal device may
be: 1. a terminal device satisfying performance in a registration phase, for example,
a terminal device having the trusted execution environment; 2. a terminal device currently
connected to a base station, for example, a terminal device currently connected to
a base station whose ID is 1101100100111111; or 3. a terminal device having a fixed
location for long time, for example, a terminal device connected, for the long time,
to a base station whose ID is 1101100100111111. Examples are not used one by one herein.
[0227] For another example, for the access network device, policy information of the access
network device may be: 1. location information of the access network device, for example,
an access network device located in a cell in an area; or 2. security and computing
capabilities of the access network device, for example, an access network device having
the trusted execution environment and a CPU 4-core computing capability. Examples
are not used one by one herein.
[0228] For another example, for the core network element, policy information of the core
network element may be a core network element related to a service, for example, a
network element that manages mobility; or for another example, a network element whose
current traffic is idle.
[0229] For another example, for the independent node, policy information of the independent
node may be an independent node satisfying some performance requirements, for example,
a CPU 64-core independent node, an independent node with a primary storage of 100
G, or an independent node with a gigabit network interface. Examples are not used
one by one herein.
[0230] For another example, for the application function node, policy information of the
application function node may be an application function node satisfying some performance
requirements, for example, a CPU 64-core application function node, an application
function node with a primary storage of 100 G, or an application function node with
a gigabit network interface. Examples are not used one by one herein.
[0231] For example, refer to Table 1 below. Table 1 shows a specific example of the blockchain
establishment requirement information provided in this embodiment of this application.
It should be noted that the blockchain establishment requirement information may include
one or more items in Table 1. As shown in Table 1 below, a 1
st column indicates a requirement parameter, namely, each requirement in the blockchain
establishment requirement information, a 2
nd column indicates parameter details, namely, a detailed configuration for a corresponding
requirement, and a 3
rd column indicates a parameter description, namely, a specific description of a meaning
of the requirement parameter.
Table 1
Requirement parameter |
Parameter details |
Parameter description |
Identification information of the first node |
ID 1, ID 2, ID 3, ... |
IDs of nodes participating in the blockchain |
Blockchain structure |
Single chain, parallel chain, shard, DAG, ... |
Plurality of alternative blockchain forms |
Consensus mechanism |
PoW, RAFT, PBFT, PoW, ... |
Plurality of alternative consensus mechanisms |
Throughput |
100, 500, 1000, ... |
Throughput requirements of the blockchain |
Whether being editable is supported |
0/1 |
Whether the blockchain supports the editing function |
0: no/1: yes (or 0 indicates yes, and 1 indicates no) |
Quantity of nodes |
4, 5, 6, ... |
Quantities of nodes on which the blockchain is to be deployed |
Whether the terminal device participates |
0/1 |
Whether the terminal device participates in the blockchain |
0: no/1: yes (or 0 indicates yes, and 1 indicates no) |
Whether the terminal device can provide the trusted execution environment for the
running of the blockchain |
0/1 |
0: no/1: yes (or 0 indicates no, and 1 indicates yes) |
Terminal device supporting the full-node mode |
SUPI 1, SUPI 2, ...; or |
Explicitly indicate: ID information of terminal devices supporting the full-node mode;
or |
policy information 1-1, policy information 1-2, ... |
policy information of terminal devices supporting the full-node mode, for example,
1. the terminal device satisfying performance in a registration phase; 2. the terminal
device currently connected to a base station; and 3. the terminal device having a
fixed location for long time |
Terminal device supporting the light-node mode |
SUPI 3, SUPI 4, ...; or |
Explicitly indicate: ID information of terminal devices supporting the light-node
mode; or |
policy information 1-3, policy information 1-4, ... |
policy information of terminal devices supporting the light-node mode, for example,
1. the terminal device satisfying performance in a registration phase; 2. the terminal
device currently connected to a base station; and 3. the terminal device having a
fixed location for long time |
Terminal device supporting the micronode mode |
SUPI 5, SUPI 6, ...; or |
Explicitly indicate: ID information of terminal devices supporting the micronode mode;
or |
policy information 1-5, policy information 1-6, ... |
policy information of terminal devices supporting the micronode mode, for example,
1. the terminal device satisfying performance in a registration phase; 2. the terminal
device currently connected to a base station; and 3. the terminal device having a
fixed location for long time |
Terminal device supporting the client mode |
SUPI 7, SUPI 8, ...; or |
Explicitly indicate: ID information of terminal devices supporting the client mode;
or |
policy information 1-7, policy information 1-8, ... |
policy information of terminal devices supporting the client mode, for example, 1.
the terminal device satisfying performance in a registration phase; 2. the terminal
device currently connected to a base station; and 3. the terminal device having a
fixed location for long time |
Whether the access network device participates |
0/1 |
Whether the access network device participates in the blockchain |
0: no/1: yes (or 0 indicates yes, and 1 indicates no) |
Whether the access network device can provide the trusted execution environment for
the running of the blockchain |
0/1 |
0: no/1: yes (or 0 indicates no, and 1 indicates yes) |
Access network device supporting the full-node mode |
ID 2-1, ID 2-2, ...; or |
Explicitly indicate: ID information of access network devices supporting the full-node
mode; or |
policy information 2-1, policy information 2-2, ... |
policy information of access network devices supporting the full-node mode, for example,
1. the location information of the access network device; and 2. the security and
computing capabilities of the access network device |
Access network device supporting the light-node mode |
ID 2-3, ID 2-4, ...; or |
Explicitly indicate: ID information of access network devices supporting the light-node
mode; or |
policy information 2-3, policy information 2-4, ... |
policy information of access network devices supporting the light-node mode, for example,
1. the location information of the access network device; and 2. the security and
computing capabilities of the access network device |
Access network device supporting the micronode mode |
ID 2-5, ID 2-6, ...; or |
Explicitly indicate: ID information of access network devices supporting the micronode
mode; or |
policy information 2-5, policy information 2-6, ... |
policy information of access network devices supporting the micronode mode, for example,
1. the location information of the access network device; and 2. the security and
computing capabilities of the access network device |
Access network device supporting the client mode |
ID 2-7, ID 2-8, ...; or |
Explicitly indicate: ID information of access network devices supporting the client
mode; or |
policy information 2-7, policy information 2-8, ... |
policy information of access network devices supporting the client mode, for example,
1. the location information of the access network device; and 2. the security and
computing capabilities of the access network device |
Whether the core network element participates |
0/1 |
Whether the core network element participates in the blockchain |
0: no/1: yes (or 0 indicates yes, and 1 indicates no) |
Whether the core network element can provide the trusted execution environment for
the running of the blockchain |
0/1 |
0: no/1: yes (or 0 indicates no, and 1 indicates yes) |
Core network element supporting the full-node mode |
ID 3-1, ID 3-2, ...; or |
Explicitly indicate: ID information of core network elements supporting the full-node
mode; or |
policy information 3-1, policy information 3-2, ... |
policy information of core network elements supporting the full-node mode, for example,
3-1. core network elements related to a service |
Core network element supporting the light-node mode |
ID 3-3, ID 3-4, ...; or |
Explicitly indicate: ID information of core network elements supporting the light-node
mode; or |
policy information 3-3, policy information 3-4, ... |
policy information of core network elements supporting the light-node mode, for example,
core network elements related to a service |
Core network element supporting the micronode mode |
ID 3-5, ID 3-6, ...; or |
Explicitly indicate: ID information of core network elements supporting the micronode
mode; or |
policy information 3-5, policy information 3-6, ... |
policy information of core network elements supporting the micronode mode, for example,
core network elements related to a service |
Core network element supporting the client mode |
ID 3-7, ID 3-8, ...; or |
Explicitly indicate: ID information of core network elements supporting the client
mode; or |
policy information 3-7, policy information 3-8, ... |
policy information of core network elements supporting the client mode, for example,
core network elements related to a service |
When the independent node participates |
0/1 |
Whether the independent node participates in the blockchain |
0: no/1: yes (or 0 indicates yes, and 1 indicates no) |
Whether the independent node can provide the trusted execution environment for the
running of the blockchain |
0/1 |
0: no/1: yes (or 0 indicates no, and 1 indicates yes) |
Independent node supporting the full-node mode |
ID 4-1, ID 4-2, ...; or |
Explicitly indicate: ID information of independent nodes supporting the full-node
mode; or |
policy information 4-1, policy information 4-2, ... |
policy information of independent nodes supporting the full-node mode, for example,
4-1. independent nodes satisfying some performance requirements |
Independent node supporting the light-node mode |
ID 4-3, ID 4-4, ...; or |
Explicitly indicate: ID information of independent nodes supporting the light-node
mode; or |
policy information 4-3, policy information 4-4, ... |
policy information of independent nodes supporting the light-node mode, for example,
independent nodes satisfying some performance requirements |
Independent node supporting the micronode mode |
ID 4-5, ID 4-6, ...; or |
Explicitly indicate: ID information of independent nodes supporting the micronode
mode; or |
policy information 4-5, policy information 4-6, ... |
policy information of independent nodes supporting the micronode mode, for example,
independent nodes satisfying some performance requirements |
Independent node supporting the client mode |
ID 4-7, ID 4-8, ...; or |
Explicitly indicate: ID information of independent nodes supporting the client mode;
or |
policy information 4-7, policy information 4-8, ... |
policy information of independent nodes supporting the client mode, for example, independent
nodes satisfying some performance requirements |
Whether the application function node participates |
0/1 |
Whether the application function node participates in the blockchain |
0: no/1: yes (or 0 indicates yes, and 1 indicates no) |
Whether the application function node can provide the trusted execution environment
for the running of the blockchain |
0/1 |
0: no/1: yes (or 0 indicates no, and 1 indicates yes) |
Application function node supporting the full-node mode |
ID 5-1, ID 5-2, ...; or |
Explicitly indicate: ID information of application function nodes supporting the full-node
mode; or |
policy information 5-1, policy information 5-2, ... |
policy information of application function nodes supporting the full-node mode, for
example, application function nodes satisfying some performance requirements |
Application function node supporting the light-node mode |
ID 5-3, ID 5-4, ...; or |
Explicitly indicate: ID information of application function nodes supporting the light-node
mode; or |
policy information 5-3, policy information 5-4, ... |
policy information of application function nodes supporting the light-node mode, for
example, application function nodes satisfying some performance requirements |
Application function node supporting the micronode mode |
ID 5-5, ID 5-6, ...; or |
Explicitly indicate: ID information of application function nodes supporting the micronode
mode; or |
policy information 5-5, policy information 5-6, ... |
Application function node supporting the client mode |
ID 5-7, ID 5-8, ...; or |
Explicitly indicate: ID information of application function nodes supporting the client
mode; or |
policy information 5-7, policy information 5-8, ... |
policy information of application function nodes supporting the client mode, for example,
application function nodes satisfying some performance requirements |
Access control policy for the blockchain-terminal device |
LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy |
LAF authorization: The LAF performs authorization by using an authorization code |
LAF access control: The LAF performs access control |
LAF transparent transmission: The LAF performs transparent transmission of an access
request, and a ledger node performs access control |
LAF proxy: The LAF performs a proxy service, and provides access data |
Access control policy for the blockchain-access network device |
LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy |
Same as above |
Access control policy for the blockchain-core network element |
LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy |
Same as above |
Access control policy for the blockchain-independent node |
LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy |
Same as above |
Access control policy for the blockchain-application function node |
LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy |
Same as above |
Configuration information-terminal Device |
Configuration information |
Configuration information delivered by the LAF, for example, a trigger condition of
transaction reporting |
Configuration information-access network device |
Configuration information |
Same as above |
Configuration information-core network element |
Configuration information |
Same as above |
Configuration information-independent node |
Configuration information |
Same as above |
Configuration information-application function node |
Configuration information |
Same as above |
[0232] Optionally, before step S401, the following step S400 may further be included.
[0233] S400: A plurality of nodes send blockchain capability information to the LAF. Accordingly,
the LAF receives the blockchain capability information from the plurality of nodes.
[0234] The plurality of nodes include the at least one first node. In other words, each
node having a blockchain capability may report blockchain capability information of
the node to the LAF. Alternatively, when blockchain capability information of a node
having a blockchain capability is changed or updated, the node may report latest blockchain
capability information of the node to the LAF.
[0235] In an implementation, blockchain capability information reported by any node may
include a mode supported by the node and a capability of the node in mode, for example,
the client mode, the micronode mode, the light-node mode, or the full-node mode. This
is not limited herein. Generally, a node in the client mode and a node in the micronode
mode include at least one of the following capabilities: the smart-contract deployment,
invoking, or execution capability, the transaction reporting, querying, or execution
capability, the block querying capability, the computing capability, the storage capability,
the network capability, the security algorithm capability, and the trusted-execution-environment
provision capability. A node in light-node mode and a node in the full-node mode include
at least one of the following capabilities: the smart-contract deployment, invoking,
or execution capability, the transaction reporting, querying, or execution capability,
the block querying capability, the computing capability, the storage capability, the
network capability, the security algorithm capability, the trusted-execution-environment
provision capability, and the consensus capability.
[0236] In another implementation, blockchain capability information reported by any node
may alternatively directly include at least one of the following capabilities: the
smart-contract deployment capability, the smart-contract invoking capability, the
smart-contract execution capability, the transaction reporting capability, the transaction
querying capability, the transaction execution capability, the block querying capability,
the computing capability, the storage capability, the network capability, the security
algorithm capability, the trusted-execution-environment provision capability, the
consensus capability, and the like. This is not limited herein. In other words, when
reporting the blockchain capability information, the node may not report a mode supported
by the node, but report only the capability of the node.
[0237] After receiving the blockchain capability information of the plurality of nodes,
the LAF may store the blockchain capability information of the plurality of nodes,
that is, locally store the received blockchain capability information of the plurality
of nodes. Optionally, the LAF may alternatively send the received blockchain capability
information of the plurality of nodes to a sixth node. Therefore, the sixth node may
receive and store the blockchain capability information of the plurality of nodes
from the LAF.
[0238] It may be understood that, when the nodes are terminal devices, the sixth node may
be a unified data management (unified data management, UDM); when the nodes are access
network devices (for example, base stations), the sixth node may be an OAM; when the
nodes are NFs, the sixth node may be an NRF; when the nodes are AFs, the sixth node
may be a NEF; or when the nodes are INNs, the sixth node may be the LAF, or the sixth
node may be another network element or the like. This is not limited herein. Optionally,
the sixth node may alternatively be a newly defined network element, for example,
a unified trusted data management (unified trusted data management, UTDM). This is
not limited herein. The newly defined network element may be configured to store blockchain
capability information of one or more types of nodes such as the terminal device,
the access network device, the core network element, the independent node, the application
function node, and the edge network node. It may be understood that a name of the
newly defined network element may alternatively not be limited to the UTDM. For ease
of description, the UTDM is mainly used as an example for description subsequently.
[0239] It should be noted that the blockchain capability information reported by each node
is used by the LAF to determine, before the LAF delivers the first message, a node
or nodes satisfying the blockchain establishment requirement, to send first messages
to the nodes satisfying the requirement. In other words, the LAF may determine, based
on the blockchain establishment requirement information and the blockchain capability
information reported by each node, the node or the nodes that may serve as the first
node or the first nodes. After determining the first nodes, the LAF may send the first
messages to the first nodes.
[0240] S402: The LAF receives a first indication message from the at least one first node.
[0241] The first indication message indicates whether the first node is successfully configured,
or it is understood as that the first indication message indicates whether the first
node is successfully activated. Specifically, the first indication message includes
configuration success information or configuration failure information, or it is understood
as that the first indication message includes activation success information or activation
failure information.
[0242] Optionally, the LAF may determine a blockchain establishment result based on the
first indication message from the at least one first node. The blockchain establishment
result includes a blockchain establishment success or a blockchain establishment failure.
For example, the LAF may determine the blockchain establishment result based on an
amount of configuration success information returned by the first node, or the LAF
may determine the blockchain establishment result based on an amount of configuration
failure information returned by the first node.
[0243] For example, if the amount of configuration success information is greater than or
equal to a first quantity threshold, the blockchain establishment result is the blockchain
establishment success; or if the amount of configuration success information is less
than a first quantity threshold, the blockchain establishment result is the blockchain
establishment failure.
[0244] For another example, if the amount of configuration failure information is greater
than or equal to a second quantity threshold, the blockchain establishment result
is the blockchain establishment failure; or if the amount of configuration failure
information is less than a second quantity threshold, the blockchain establishment
result is the blockchain establishment success.
[0245] Optionally, if the amount of configuration success information is less than the first
quantity threshold, a node satisfying the blockchain establishment requirement is
reselected, and the node is configured to be the blockchain node; or if the amount
of configuration failure information is greater than or equal to the second quantity
threshold, a node satisfying the blockchain establishment requirement is reselected,
and the node is configured to be the blockchain node.
[0246] The first quantity threshold and the second quantity threshold may be set to be the
same or different. This is specifically determined based on an actual application
scenario, and is not limited herein.
[0247] Optionally, the LAF may further send a second message to a third node, where the
third node is a successfully configured node in the at least one configured first
node, and the second message is for canceling the third node serving as the blockchain
node. Optionally, the LAF may receive a second indication message from the third node,
where the second indication message indicates whether the third node is successfully
canceled. In other words, in addition to configuring a node having a blockchain capability
to be the blockchain node, the LAF may further cancel or delete one or more nodes
in the blockchain, to create or manage the blockchain.
[0248] Optionally, the LAF may further update or change configuration information for a
configured blockchain node. For example, the first node is a terminal device 1. Assuming
that the terminal device 1 is initially configured to be a full node in the blockchain,
in a subsequent blockchain management process, the LAF may further update the terminal
device 1 to a micronode in the blockchain, and the like. This is specifically determined
based on an actual application scenario, and is not limited herein.
[0249] Optionally, if the blockchain establishment requirement information is generated
and sent to the LAF by the another node, after the LAF determines the blockchain establishment
result, the LAF may further send the blockchain establishment result to the another
node having the blockchain establishment requirement. Optionally, when the blockchain
establishment result is sent, a blockchain establishment log may further be sent,
where the blockchain establishment log includes a requirement completion status.
[0250] For example, refer to Table 2 below. Table 2 shows a specific example of the blockchain
establishment log provided in this embodiment of this application. As shown in Table
2 below, a 1
st column indicates a requirement parameter, and a 2
nd column indicates an actual requirement completion status. It may be understood that
Table 2 is merely an example. During specific implementation, the blockchain establishment
log may be provided based on a specific requirement parameter. For example, at least
one row in Table 2 is included.
Table 2
Requirement parameter |
Requirement completion status |
Identification information of the first node |
Completed/Uncompleted |
Blockchain structure |
Completed/Uncompleted |
Consensus mechanism |
Completed/Uncompleted |
Throughput |
Completed/Uncompleted |
Whether being editable is supported |
Completed/Uncompleted |
Access control policy for the blockchain-access network device |
LAF authorization |
Access control policy for the blockchain-core network element |
LAF access control |
Access control policy for the blockchain-independent node |
LAF transparent transmission |
Access control policy for the blockchain-application function node |
LAF proxy |
Access control policy for the blockchain-access network device |
LAF access control |
[0251] For another example, refer to Table 3 below. Table 3 shows another example of the
blockchain establishment log provided in this embodiment of this application. As shown
in Table 3 below, a 1
st column indicates a type of a node, a 2
nd column indicates a requirement configuration for the node, and a 3
rd column indicates an actual requirement completion status. It may be understood that
Table 3 is merely an example. For example, at least one row in Table 3 may be included.
Table 3
Type of the node |
Requirement configuration for the node |
Requirement completion status |
Terminal device |
SUPI 1-full-node mode |
The SUPI 1 succeeds |
SUPI 2-full-node mode |
The SUPI 2 fails |
... |
... |
Access network device |
gNB 1-full-node mode |
A gNB 1 succeeds |
gNB 2-light-node mode |
A gNB 2 succeeds |
... |
... |
Core network element |
Null |
Null |
Independent node |
Null |
Null |
Application function node |
AF 1-full-node mode |
An AF 1 succeeds |
AF 2-client mode |
An AF 2 succeeds |
... |
... |
[0252] In this embodiment of this application, the communication network is combined with
the blockchain, so that the communication network directly creates and manages the
blockchain. A decentralized public key infrastructure (decentralized public key infrastructure,
DKPI) service is used as an example. The administrator (namely, the second node) of
the operator may send a chain establishment requirement of a DPKI to the LAF. After
parsing the requirement, the LAF determines nodes on which the DPKI is to be deployed,
and respective modes of deployment on the nodes. Therefore, the LAF publishes first
messages to the nodes to configure the nodes to be blockchain nodes. According to
this embodiment of this application, the LAF can automatically parse a blockchain
creation requirement of a requirementer, comprehensively manage an infrastructure
of the blockchain in the telecommunications network, shield details of an underlying
blockchain in the telecommunications network for the requirementer, and provide a
more convenient blockchain creation/management service for the requirementer.
[0253] With reference to FIG. 5 and FIG. 6, the following separately describes in detail
a process of sending the first message to the at least one first node based on the
blockchain establishment requirement information in step S401. Blockchain establishment
requirement information in FIG. 5 includes the policy information, and blockchain
establishment requirement information in FIG. 6 includes the identification information
of the first node.
[0254] FIG. 5 is a schematic flowchart of a blockchain creation method according to an embodiment
of this application. As shown in FIG. 5, the blockchain creation method includes S501
and S502.
[0255] S501: A LAF obtains identification information of a network element in which a first
node is located, address information of the first node, or identification information
of the first node based on policy information in blockchain establishment requirement
information.
[0256] In an implementation, that a LAF obtains identification information of a network
element in which a first node is located, address information of the first node, or
identification information of the first node based on policy information in blockchain
establishment requirement information may be understood as that the LAF obtains, from
information locally stored by the LAF, the identification information of the network
element in which the first node is located, the address information of the first node,
or the identification information of the first node based on the policy information.
In other words, the LAF may store information related to the first node. For example,
when a type of the first node is an independent node, because the independent node
is an entity that does not exist in an existing communication network, the LAF may
store information about the independent node.
[0257] It may be understood that identification information of any first node may uniquely
identify the first node. For example, when a type of the first node is a terminal
device, the identification information of the first node may be subscription permanent
identifier (subscription permanent identifier, SUPI) information, a device ID, an
international mobile equipment identity (international mobile equipment identity,
IMEI), or the like. This is not limited herein. When a type of the first node is an
access network device, the identification information of the first node may be a physical
cell identifier (physical cell identifier, PCI), a cell global identifier (cell global
identifier, CGI), a device ID, or the like. This is not limited herein. When a type
of the first node is a core network element, the identification information of the
first node may be a fully qualified domain name (fully qualified domain name, FQDN),
a uniform resource identifier (uniform resource identifier, URI), a network function
ID, or the like. This is not limited herein. When a type of the first node is an application
function node, the identification information of the first node may be an FQDN, a
URI, or the like. This is not limited herein. When the type of the first node is the
independent node, the identification information of the first node may be an FQDN,
a URI, a node ID, or the like. This is not limited herein.
[0258] In another implementation, that a LAF obtains identification information of a network
element in which a first node is located, address information of the first node, or
identification information of the first node based on policy information in blockchain
establishment requirement information may be understood as follows: The LAF sends
a first query request to a fourth node, where the first query request includes the
policy information. Accordingly, the fourth node receives the first query request
from the LAF. Further, the fourth node may obtain the identification information of
the network element in which the first node is located, the address information of
the first node, or the identification information of the first node based on the policy
information included in the first query request, and further feed back a first response
message to the LAF, where the first response message carries the identification information
of the network element in which the first node is located, the address information
of the first node, or the identification information of the first node. The following
separately describes in detail cases in which types of the first node are a terminal
device, an access network device, a core network element, an independent node, an
application function node, and an edge network node.
[0259] In an example, a type of the first node is the terminal device. The LAF may obtain,
based on the policy information by using the following steps, the identification information
of the network element in which the first node is located: S1. The LAF sends the first
query request to the fourth node, where the first query request includes the policy
information. Accordingly, the fourth node receives the first query request from the
LAF. Further, the fourth node may obtain the identification information (for example,
a SUPI) of the first node based on the policy information included in the first query
request. S2: The fourth node feeds back the first response message to the LAF, where
the first response message includes the SUPI. S3: The LAF sends a second query request
to a fifth node, where the second query request includes the SUPI. Accordingly, the
fifth node receives the second query request from the LAF, and obtains, based on the
SUPI included in the second query request, the identification information of the network
element (for example, an AMF) in which the first node is located. S4: The fifth node
feeds back a second response message to the LAF, where the second response message
includes the identification information of the AMF. In an implementation, the fourth
node may be specifically a PCF, and the fifth node may be specifically a UDM. Optionally,
in another implementation, when the fourth node is a new network element, the fourth
node may include information related to one or more types of nodes such as the terminal
device, the access network device, the core network element, the application function
node, the independent node, and the edge network node. For example, the fourth node
may be referred to as a UTDM, or the fourth node may have another name. This is not
limited herein. In other words, information related to the terminal device, the access
network device, the core network element, the application function node, the independent
node, and/or the edge network node may be aggregated to a same network function (namely,
the fourth node, where for example, the fourth node may be the UTDM). Therefore, the
terminal device may directly obtain, through query from the fourth node based on the
policy information, the AMF in which the terminal device is located.
[0260] In another example, a type of the first node is the access network device. The fourth
node may be specifically an OAM, a UTDM, or the like. This is not limited herein.
[0261] It should be noted that, when a type of the first node is the terminal device or
the access network device, information that is about the first node and that is obtained
by the LAF based on the policy information is the identification information of the
network element in which the first node is located. For example, the network element
in which the first node is located may be an AMF. This is not limited herein.
[0262] When a type of the first node is the core network element or the application function
node, information that is about the first node and that is obtained by the LAF based
on the policy information may be the address information of the first node. For example,
the address information of the first node may be an internet protocol (internet protocol,
IP) address. Optionally, when the type of the first node is the core network element
or the application function node, the information that is about the first node and
that is obtained by the LAF based on the policy information may alternatively be the
identification information of the first node. For example, the identification information
of the first node may be an FQDN, a URI, or the like. This is not limited herein.
[0263] In another example, when a type of the first node is the core network element, the
fourth node may be specifically an NRF, a UTDM, or the like. This is not limited herein.
[0264] In another example, a type of the first node is the application function node. The
fourth node may be specifically a NEF, a UTDM, or the like. This is not limited herein.
[0265] When a type of the first node is the independent node, information that is about
the first node and that is obtained by the LAF based on the policy information may
be whether the node is currently idle, a current resource occupation status, a physical
location, address information (for example, an IP address), an FQDN, a URI, and/or
the like. Specifically, the fourth node may be a UTDM or the like. This is not limited
herein.
[0266] In another example, when a type of the first node is the edge network node, the fourth
node may be specifically a UTDM or the like. This is not limited herein.
[0267] S502: The LAF sends a first message to at least one first node based on the identification
information of the network element in which the first node is located, the address
information of the first node, or the identification information of the first node.
[0268] In some feasible implementations, after the LAF obtains the identification information
of the network element in which the first node is located, the address information
of the first node, or the identification information of the first node, the LAF may
send the first message to the at least one first node based on the identification
information of the network element in which the first node is located, the address
information of the first node, or the identification information of the first node.
[0269] Specifically, when the type of the first node is the terminal device or the access
network device, the LAF may send the first message to the first node via the network
element (for example, the AMF) in which the first node is located.
[0270] When the type of the first node is the core network element or the application function
node, the LAF may send the first message to the first node via the IP address of the
first node, or the LAF may send the first message to the first node via the FQDN or
the URI.
[0271] When the type of the first node is the independent node, the LAF may send the first
message to the first node via the FQDN or the URI.
[0272] FIG. 6 is a schematic flowchart of another blockchain creation method according to
an embodiment of this application. As shown in 6, the blockchain creation method includes
S601 and S602.
[0273] S601: A LAF obtains identification information of a first node from blockchain establishment
requirement information.
[0274] In other words, the blockchain establishment requirement information may directly
include the identification information of the first node. For understanding of the
identification information of the first node, refer to the related descriptions in
S501. Details are not described herein again.
[0275] S602: The LAF sends a first message to at least one first node based on the identification
information of the first node.
[0276] In an implementation, the LAF may directly send the first message to the at least
one first node based on the identification information of the first node. For example,
when a type of the first node is a core network element, the identification information
of the first node is a URI. Therefore, the LAF may send the first message to the corresponding
core network element based on the URI. In another example, when a type of the first
node is an application function node, the identification information of the first
node is a URI. Therefore, the LAF may send the first message to the corresponding
application function node based on the URI.
[0277] In another implementation, that the LAF sends a first message to at least one first
node based on the identification information of the first node may be understood as
that the LAF obtains identification information of a network element in which the
first node is located or address information of the first node based on the identification
information of the first node, and further sends the first message to the at least
one first node based on the identification information of the network element in which
the first node is located or the address information of the first node.
[0278] That the LAF obtains information about the first node based on the identification
information of the first node may be understood as follows: The LAF sends a second
query request to a fifth node, where the second query request includes the identification
information of the first node. Accordingly, the fifth node receives the second query
request from the LAF, further obtains the identification information of the network
element in which the first node is located or the address information of the first
node based on the identification information of the first node in the second query
request, and further feeds back a second response message to the LAF, where the second
response message includes the identification information of the network element in
which the first node is located or the address information of the first node. The
following separately describes in detail cases in which types of the first node are
a terminal device, an access network device, a core network element, an independent
node, an application function node, and an edge network node.
[0279] For example, when a type of the first node is the terminal device, the fifth node
is a UDM, and the information about the first node obtained based on the identification
information of the first node is the identification information of the network element
in which the first node is located. For example, a network element in which the terminal
device is located is an AMF.
[0280] For example, when a type of the first node is an access network device, the fifth
node may be an OAM, and the information about the first node obtained based on the
identification information of the first node is the identification information of
the network element in which the first node is located. For example, a network element
in which the access network device is located is an AMF.
[0281] For example, when a type of the first node is the core network element, the fifth
node may be an NRF, and the information about the first node obtained based on the
identification information of the first node is the address information of the first
node. For example, an address information of the core network element is an IP address
of the core network element.
[0282] For example, when a type of the first node is the application function node, the
fifth node may be a NEF, and the information about the first node obtained based on
the identification information of the first node is the address information of the
first node. For example, address information of the application function node is an
IP address.
[0283] Optionally, the LAF may also aggregate all information related to the terminal device,
the access network device, the core network element, the application function node,
the independent node, and/or the edge network node. Therefore, that the LAF obtains
identification information of a network element in which the first node is located
or address information of the first node based on the identification information of
the first node is internal implementation of the LAF.
[0284] Optionally, the fifth node may alternatively be a new network element, for example,
a UTDM or another name. The new network element aggregates all the information related
to the terminal device, the access network device, the core network element, the application
function node, the independent node, and/or the edge network node.
[0285] It may be understood that, to make the solutions in FIG. 5 and FIG. 6 clearer, the
following provides further descriptions with reference to FIG. 7A, FIG. 7B, FIG. 8A,
and FIG. 8B.
[0286] FIG. 7A and FIG. 7B are a diagram of an establishment process of a blockchain comprising
a plurality of types of nodes according to an embodiment of this application. As shown
in FIG. 7A and FIG. 7B, in a blockchain establishment requirement, the blockchain
may need to be deployed on a plurality of types of first nodes, for example, one or
more types of nodes such as a terminal device, an access network device, a core network
element, an application function node, and an independent node. After parsing blockchain
establishment requirement information, a LAF needs to interact with other network
elements to obtain information about the first nodes, for example, identification
information of an AMF (namely, an AMF ID) in which the terminal device is located,
an ID of an AMF in which the access network device is located, address information
(for example, an IP address) of the core network element, and address information
(for example, an IP address) of the application function node. As shown in FIG. 7A
and FIG. 7B, functions of the other network elements may still use the standard in
5G. For example, a UDM stores information about the terminal device, an OAM stores
information about the access network device, an NRF stores information about the core
network element, and a NEF stores information about the application function node.
Because the independent node is an entity that does not exist in an existing telecommunications
network, the LAF may store information about the independent node, or another network
element may store information about the independent node. For ease of description,
in FIG. 7A and FIG. 7B, an example in which the LAF stores the information about the
independent node is mainly used for description. Details are as follows:
- 1. When the blockchain is deployed on the terminal device:
The LAF requests the information about the terminal device from the UDM. The information
may specifically include blockchain capability information reported by the terminal
device, and/or may include one or more of the following information: information such
as an identifier of the AMF in which the terminal device is located. There are the
following two cases in which the LAF queries the UDM.
- (a) When the blockchain establishment requirement information includes identification
information of the terminal device, for example, SUPI information of the terminal
device, the LAF queries, based on the SUPI information, the UDM for the ID of the
AMF in which the terminal device is located, and the UDM returns the ID of the AMF
in which the terminal device is located. Therefore, the LAF may communicate with the
terminal device via the AMF. That is, the LAF sends a first message to the terminal
device via the AMF and an access network device served by the AMF, and receives a
first indication message fed back by the terminal device.
- (b) When the blockchain establishment requirement information includes policy information,
for example, a terminal device at a location, the LAF first queries a PCF for SUPI
information of the terminal device at the location, and the PCF returns the SUPI information
of the terminal device to an AMF. Further, the LAF queries, based on an SUPI, the
UDM for an ID of an AMF in which the terminal device is located, and the UDM returns
the ID of the AMF in which the terminal device is located. Therefore, the LAF may
communicate with the terminal device via the AMF. That is, the LAF sends a first message
to the terminal device via the AMF and an access network device served by the AMF,
and receives a first indication message fed back by the terminal device.
- 2. When the blockchain is deployed on the access network device:
The LAF requests the information about the access network device from the OAM. The
information may specifically include blockchain capability information reported by
the access network device, and/or may include one or more of the following information:
information such as the identifier of the AMF in which the access network device is
located. Specifically, the LAF queries, based on identification information (for example,
a PCI) or policy information (for example, an access network device at a location)
of the access network device included in the blockchain establishment requirement
information, the UDM for the ID of the AMF in which the access network device is located,
and the UDM returns the ID of the AMF in which the access network device is located.
Therefore, the LAF may communicate with the access network device via the AMF. That
is, the LAF sends a first message to the access network device via the AMF, and receives
a first indication message fed back by the access network device.
- 3. When the blockchain is deployed on the core network element, the LAF requests the
information about the core network element from the NRF (for example, queries the
NRF via identification information or policy information of the core network element).
The information may specifically include blockchain capability information reported
by the core network element, and/or may include one or more of the following information:
information such as an IP address, an FQDN, a URI that are of the core network element,
and a home PLMN of the core network element. The LAF may send a first message to the
core network element via the IP address, and receive a first indication message fed
back by the core network element. Optionally, the LAF may alternatively directly send
the first message to the core network element via the identification information (for
example, the FQDN or the URI) of the core network element, and receive the first indication
message fed back by the core network element.
- 4. When the blockchain is deployed on the application function node, the LAF queries
the NEF for the information about the application function node (for example, queries
the NEF via identification information or policy information of the application function
node). The information may specifically include blockchain capability information
reported by the application function node; and/or may include one or more of the following
information: information such as the IP address, an FQDN, and a URI that are of the
application function node, and a third-party enterprise corresponding to the application
function node. The LAF may send a first message to the application function node via
the IP address or a location, and receive a first indication message fed back by the
application function node. Optionally, the LAF may alternatively directly send the
first message to the application function node via the identification information
(for example, the FQDN or the URI) of the application function node, and receive the
first indication message fed back by the application function node.
- 5. When the blockchain is deployed on the independent node, the LAF obtains the information
about the independent node through self-querying (for example, self-querying via identification
information or policy information of the independent node). The information may specifically
include blockchain capability information of the independent node, and/or may include
one or more of the following information: information such as a location of the independent
node (for example, a physical location of the independent node, or a data center/data
cloud in which the independent node is located), and an IP address. The LAF may send
a first message to the independent node via the IP address, and receive a first indication
message fed back by the independent node. Optionally, the LAF may alternatively directly
send the first message to the independent node via the identification information
(for example, an FQDN or a URI) of the independent node, and receive the first indication
message fed back by the independent node.
[0287] FIG. 8A and FIG. 8B are another diagram of an establishment process of a blockchain
comprising a plurality of types of nodes according to an embodiment of this application.
As shown in FIG. 8A and FIG. 8B, in a blockchain establishment requirement, the blockchain
may need to be deployed on a plurality of types of first nodes, for example, one or
more types of nodes such as a terminal device, an access network device, a core network
element, an application function node, and an independent node. After parsing blockchain
establishment requirement information, a LAF needs to interact with another network
element to obtain information about the first nodes. Herein, for example, the another
network element is a new network element, for example, a UTDM. Details are as follows:
- 1. When the blockchain is deployed on the terminal device:
The LAF requests information about the terminal device from the UTDM based on identification
information of the terminal device or policy information included in the blockchain
establishment requirement information. The information may specifically include blockchain
capability information reported by the terminal device, and/or may include one or
more of the following information: information such as an identifier of an AMF in
which the terminal device is located. The LAF may communicate with the terminal device
via the AMF. That is, the LAF sends a first message to the terminal device via the
AMF and an access network device served by the AMF, and receives a first indication
message fed back by the terminal device.
- 2. When the blockchain is deployed on the access network device:
The LAF requests information about the access network device from the UTDM based on
identification information of the access network device or policy information included
in the blockchain establishment requirement information. The information may specifically
include blockchain capability information reported by the access network device, and/or
may include one or more of the following information: information such as an identifier
of an AMF in which the access network device is located. The LAF may communicate with
the access network device via the AMF. That is, the LAF sends a first message to the
access network device via the AMF, and receive a first indication message fed back
by the access network device.
- 3. When the blockchain is deployed on the core network element, the LAF requests information
about the core network element from the UTDM based on identification information of
the core network element or policy information included in the blockchain establishment
requirement information. The information may specifically include blockchain capability
information reported by the core network element, and/or may include one or more of
the following information: information such as an IP address, an FQDN, a URI that
are of the core network element, and a PLMN corresponding to the core network element.
The LAF may send a first message to the core network element via the IP address, and
receive a first indication message fed back by the core network element. Optionally,
the LAF may alternatively directly send the first message to the core network element
via the identification information (for example, the FQDN or the URI) of the core
network element, and receive the first indication message fed back by the core network
element.
- 4. When the blockchain is deployed on the application function node, the LAF queries
the UTDM for information about the application function node based on identification
information of the application function node or policy information included in the
blockchain establishment requirement information. The information may specifically
include blockchain capability information reported by the application function node;
and/or may include one or more of the following information: information such as an
IP address, an FQDN, and a URI that are of the application function node, and a third-party
enterprise corresponding to the application function node. The LAF may send a first
message to the application function node via the IP address, and receive a first indication
message fed back by the application function node. Optionally, the LAF may alternatively
directly send the first message to the application function node via the identification
information (for example, the FQDN or the URI) of the application function node, and
receive the first indication message fed back by the application function node.
- 5. When the blockchain is deployed on the independent node, the LAF queries the UTDM
for information about the independent node based on identification information of
the independent node or policy information included in the blockchain establishment
requirement information. The information may specifically include blockchain capability
information reported by the independent node, and/or may include one or more of the
following information: information such as an IP address of the independent node.
The LAF may send a first message to the independent node via the IP address or a location,
and receive a first indication message fed back by the independent node. Optionally,
the LAF may alternatively directly send the first message to the independent node
via the identification information (for example, an FQDN or a URI) of the independent
node, and receive the first indication message fed back by the independent node.
[0288] With reference to FIG. 9 and FIG. 10, the following describes in detail the communication
apparatus provided in this application.
[0289] FIG. 9 is a diagram of a structure of a communication apparatus according to an embodiment
of this application. The communication apparatus shown in FIG. 9 may be configured
to implement some or all functions of the LAF in embodiments corresponding to the
blockchain creation methods, the communication apparatus shown in FIG. 9 may be configured
to implement some or all functions of the first node in embodiments corresponding
to the blockchain creation methods, the communication apparatus shown in FIG. 9 may
be configured to implement some or all functions of the second node in embodiments
corresponding to the blockchain creation methods, the communication apparatus shown
in FIG. 9 may be configured to implement some or all functions of the fourth node
in embodiments corresponding to the blockchain creation methods, the communication
apparatus shown in FIG. 9 may be configured to implement some or all functions of
the fifth node in embodiments corresponding to the blockchain creation methods, or
the communication apparatus shown in FIG. 9 may be configured to implement some or
all functions of the sixth node in embodiments corresponding to the blockchain creation
methods.
[0290] As shown in FIG. 9, the apparatus may include a transceiver unit 901, a processing
unit 902, and/or a storage unit 903. The processing unit 902 is configured to perform
data processing. The transceiver unit 901 is integrated with a receiving unit and
a sending unit. The storage unit 903 is configured to store data/information, for
example, blockchain capability information. The transceiver unit 901 may also be referred
to as a communication unit. Alternatively, the transceiver unit 901 may be split into
a receiving unit and a sending unit. Optionally, the apparatus further includes a
storage unit (not shown in FIG. 9 temporarily). The storage unit may be configured
to store instructions and/or the data, and the processing unit 902 may read the instructions
and/or the data in the storage unit, so that the apparatus implements an action of
the LAF, the first node, the second node, the fourth node, the fifth node, or the
sixth node in the foregoing method embodiments.
[0291] In an implementation, the communication apparatus is a LAF, may be an apparatus in
the LAF, or may be an apparatus that can be used together with the LAF. For example,
the LAF may be specifically a core network element or deployed in an access network
device. This is not limited herein. The communication apparatus may alternatively
be a chip system.
[0292] The transceiver unit 901 is configured to send a first message to at least one first
node, where the first message is for configuring the first node to be a blockchain
node, a type of the first node includes at least one of the following: a terminal
device, an access network device, a core network element, an independent node, an
application function node, and an edge network node, and the terminal device, the
access network device, the core network element, the independent node, the application
function node, and the edge network node are nodes having a blockchain capability
in a communication network.
[0293] The transceiver unit 901 is configured to receive a first indication message from
the at least one first node, where the first indication message indicates whether
the first node is successfully configured.
[0294] In a possible implementation, the transceiver unit 901 is further configured to receive
blockchain establishment requirement information from a second node; and
the apparatus further includes the processing unit 902, where
when the first message is sent to the at least one first node, the processing unit
902 is further configured to:
send the first message to the at least one first node based on the blockchain establishment
requirement information by using the transceiver unit 901.
[0295] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0296] In a possible implementation, the blockchain establishment requirement information
includes the policy information; and the apparatus further includes the processing
unit 902, where
when the first message is sent to the at least one first node based on the blockchain
establishment requirement information, the processing unit 902 is configured to:
obtain identification information of a network element in which the first node is
located, address information of the first node, or identification information of the
first node based on the policy information; and
send the first message to the at least one first node based on the identification
information of the network element in which the first node is located, the address
information of the first node, or the identification information of the first node
by using the transceiver unit 901.
[0297] In a possible implementation, when obtaining the identification information of the
network element in which the first node is located, the address information of the
first node, or the identification information of the first node based on the policy
information, the processing unit 902 is configured to:
send a first query request to a fourth node by using the transceiver unit 901, where
the first query request includes the policy information; and
receive a first response message from the fourth node by using the transceiver unit
901, where the first response message includes the identification information of the
network element in which the first node is located, the address information of the
first node, or the identification information of the first node.
[0298] In a possible implementation, the blockchain establishment requirement information
includes the identification information of the first node; and the apparatus further
includes the processing unit 902, where
when the first message is sent to the at least one first node based on the blockchain
establishment requirement information, the processing unit 902 is configured to:
send the first message to the at least one first node based on the identification
information of the first node by using the transceiver unit 901.
[0299] In a possible implementation, when the first message is sent to the at least one
first node based on the identification information of the first node, the processing
unit 902 is configured to:
obtain the identification information of the network element in which the first node
is located or the address information of the first node based on the identification
information of the first node; and
send the first message to the at least one first node based on the identification
information of the network element in which the first node is located or the address
information of the first node by using the transceiver unit 901.
[0300] In a possible implementation, when obtaining the identification information of the
network element in which the first node is located or the address information of the
first node based on the identification information of the first node, the processing
unit 902 is configured to:
send a second query request to a fifth node by using the transceiver unit 901, where
the second query request includes the identification information of the first node;
and
receive a second response message from the fifth node by using the transceiver unit
901, where the second response message includes the identification information of
the network element in which the first node is located or the address information
of the first node.
[0301] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0302] In a possible implementation, the type of the first node is the terminal device;
and the first response message includes the identification information of the first
node, or the second response message includes the identification information of the
network element in which the first node is located or the address information of the
first node; and
the fourth node is a policy control function PCF, or the fifth node is a unified data
management UDM.
[0303] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node, and the second response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node or the
fifth node is an operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node or the
fifth node is a network repository function NRF; or
the type of the first node is the application function node, and the fourth node or
the fifth node is a network exposure function NEF.
[0304] In a possible implementation, the processing unit 902 is further configured to:
send a blockchain establishment result to the second node based on the first indication
message from the at least one first node by using the transceiver unit 901.
[0305] In a possible implementation, when the blockchain establishment result is sent to
the second node based on the first indication message from the at least one first
node, the processing unit 902 is further configured to:
send the blockchain establishment result and a blockchain establishment log to the
second node based on the first indication message from the at least one first node
by using the transceiver unit 901, where
the blockchain establishment log includes a requirement completion status.
[0306] In a possible implementation, the first indication message includes configuration
success information or configuration failure information, and the blockchain establishment
result includes a blockchain establishment success or a blockchain establishment failure;
and
when the blockchain establishment result is sent to the second node based on the first
indication message from the at least one first node, the processing unit 902 is configured
to:
send, by using the transceiver unit 901, the blockchain establishment result to the
second node based on an amount of configuration success information included in the
first indication message from the at least one first node.
[0307] In a possible implementation, if the amount of configuration success information
is greater than or equal to a first quantity threshold, the blockchain establishment
result is the blockchain establishment success; or
if the amount of configuration success information is less than a first quantity threshold,
the blockchain establishment result is the blockchain establishment failure.
[0308] In a possible implementation, the processing unit 902 is further configured to:
if the amount of configuration success information is less than the first quantity
threshold, reselect a node satisfying a blockchain establishment requirement, and
configuring the node to be the blockchain node.
[0309] In a possible implementation, the transceiver unit 901 is further configured to:
receive blockchain capability information of a plurality of nodes, where the plurality
of nodes include the at least one first node.
[0310] In a possible implementation, the apparatus further includes the storage unit 903.
[0311] After the blockchain capability information of the plurality of nodes is received,
the storage unit 903 or the transceiver unit 901 is configured to:
the storage unit 903 is configured to store the blockchain capability information
of the plurality of nodes; or
the transceiver unit 901 is configured to send the blockchain capability information
of the plurality of nodes to a sixth node.
[0312] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0313] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0314] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0315] In a possible implementation, the transceiver unit 901 is further configured to:
send a second message to a third node, where the third node is a successfully configured
node in the at least one first node, and the second message is for canceling the third
node serving as the blockchain node; and
receive a second indication message from the third node, where the second indication
message indicates whether the third node is successfully canceled.
[0316] In another implementation, the communication apparatus is a first node, may be an
apparatus in the first node, or may be an apparatus that can be used together with
the first node. For example, the first node may be specifically a terminal device,
an access network device, a core network element, an independent node, an application
function node, an edge network node, or the like. This is not limited herein. The
communication apparatus may alternatively be a chip system.
[0317] The transceiver unit 901 is configured to receive a first message, where the first
message is for configuring the first node to be a blockchain node, a type of the first
node includes at least one of the following: a terminal device, an access network
device, a core network element, an independent node, an application function node,
and an edge network node, and the terminal device, the access network device, the
core network element, the independent node, the application function node, and the
edge network node are nodes having a blockchain capability in a communication network.
[0318] The transceiver unit 901 is configured to send a first indication message, where
the first indication message indicates whether the first node is successfully configured.
[0319] In a possible implementation, the transceiver unit 901 is further configured to:
send blockchain capability information.
[0320] In a possible implementation, the blockchain capability information includes a mode
supported by the node, and the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0321] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0322] In a possible implementation, the blockchain capability information includes at least
one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
[0323] In a possible implementation, the first indication message indicates that the first
node is successfully configured; and
the transceiver unit 901 is further configured to:
receive a second message, where the second message is for canceling the first node
serving as the blockchain node; and
send a second indication message, where the second indication message indicates whether
the first node is successfully canceled.
[0324] In another implementation, the communication apparatus is a second node, may be an
apparatus in the second node, or may be an apparatus that can be used together with
the second node. The communication apparatus may alternatively be a chip system.
[0325] The processing unit 902 is configured to determine blockchain establishment requirement
information.
[0326] The transceiver unit 901 is configured to send the blockchain establishment requirement
information.
[0327] In a possible implementation, the blockchain establishment requirement information
includes one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, a type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
[0328] In a possible implementation, the type of the first node includes at least one of
the following:
a terminal device, an access network device, a core network element, an independent
node, an application function node, and an edge network node, where
the terminal device, the access network device, the core network element, the independent
node, the application function node, and the edge network node are nodes having a
blockchain capability in a communication network.
[0329] In a possible implementation, the transceiver unit 901 is further configured to:
receive a blockchain establishment result; or
receive a blockchain establishment result and a blockchain establishment log, where
the blockchain establishment log includes a requirement completion status.
[0330] In a possible implementation, the blockchain establishment result includes a blockchain
establishment success or a blockchain establishment failure.
[0331] In a possible implementation, the mode includes one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, where
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, where the preprocessing the transaction or the transaction proposal includes
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock includes one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode includes a function of the node in the light-node mode,
and is configured to store the complete block.
[0332] In a possible implementation, the node in the client mode and the node in the micronode
mode include at least one of the following capabilities: a smart-contract deployment,
invoking, or execution capability, a transaction reporting, querying, or execution
capability, a block querying capability, a computing capability, a storage capability,
a network capability, a security algorithm capability, and a trusted-execution-environment
provision capability; and
the node in the light-node mode and the node in the full-node mode include at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
[0333] In another implementation, the communication apparatus is the fourth node, may be
an apparatus in the fourth node, or may be an apparatus that can be used together
with the fourth node. For example, the fourth node may be specifically a core network
element in 5G or a core network element newly defined in 6G. This is not limited herein.
The communication apparatus may alternatively be a chip system.
[0334] The transceiver unit 901 is configured to receive a first query request, where the
first query request includes policy information, or the first query request includes
identification information of a first node.
[0335] The transceiver unit 901 is configured to send a first response message, where when
the first query request includes the policy information, the first response message
includes identification information of a network element in which the first node is
located, address information of the first node, or the identification information
of the first node; or when the first query request includes the identification information
of the first node, the first response message includes identification information
of a network element in which the first node is located or address information of
the first node.
[0336] A type of the first node includes at least one of the following: a terminal device,
an access network device, a core network element, an independent node, an application
function node, and an edge network node, and the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node are nodes having a blockchain capability in a communication
network.
[0337] In a possible implementation, the network element in which the first node is located
is an access and mobility management function AMF.
[0338] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the policy information, the first response message
includes the identification information of the first node, and the fourth node is
a policy control function PCF.
[0339] In a possible implementation, the type of the first node is the terminal device,
the first query request includes the identification information of the first node,
the first response message includes the identification information of the network
element in which the first node is located or the address information of the first
node, and the fourth node is a unified data management UDM.
[0340] In a possible implementation, the first response message includes the identification
information of the network element in which the first node is located or the address
information of the first node; and
the type of the first node is the access network device, and the fourth node is an
operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node is a network
repository function NRF; or
the type of the first node is the application function node, and the fourth node is
a network exposure function NEF.
[0341] In a possible implementation, the apparatus further includes the storage unit 903.
[0342] The transceiver unit 901 is configured to receive blockchain capability information
of a plurality of nodes, where the plurality of nodes include at least one first node,
the type of the first node includes at least one of the following: the terminal device,
the access network device, the core network element, the independent node, the application
function node, and the edge network node, and the terminal device, the access network
device, the core network element, the independent node, the application function node,
and the edge network node are the nodes having a blockchain capability in the communication
network.
[0343] The storage unit 903 is configured to store the blockchain capability information
of the plurality of nodes, where the blockchain capability information is for a ledger
anchor function to determine the at least one first node.
[0344] For another possible implementation of the communication apparatus, refer to the
related descriptions of the function of the related device in the method embodiments
corresponding to FIG. 4 to FIG. 6. Details are not described herein again.
[0345] FIG. 10 is a diagram of a structure of another communication apparatus according
to an embodiment of this application. The communication apparatus includes a processor
1010 and an interface circuit 1020. The processor 1010 and the interface circuit 1020
are coupled to each other. It may be understood that the interface circuit 1020 may
be a transceiver or an input/output interface. Optionally, the communication apparatus
may further include a memory 1030, configured to store instructions executed by the
processor 1010, input data needed by the processor 1010 to run the instructions, or
data generated by running the instructions by the processor 1010.
[0346] When the communication apparatus is configured to implement the method in the foregoing
method embodiment, the processor 1010 is configured to perform a function of the foregoing
processing unit 902, and the interface circuit 1020 is configured to perform a function
of the foregoing transceiver unit 901.
[0347] When the communication apparatus is a chip used in a LAF, the chip implements a function
of the LAF in the foregoing method embodiment. The chip receives information from
another network element (or an entity or a node), or the chip sends information to
another network element (or an entity or a node).
[0348] When the communication apparatus is a chip used in a first node, the chip implements
a function of the first node in the foregoing method embodiment. The chip receives
information from another network element (or an entity or a node); or the first node
chip sends information to another network element (or an entity).
[0349] When the communication apparatus is a chip used in a second node, the chip used in
the second node implements a function of the second node in the foregoing method embodiment.
The chip used in the second node receives information from another network element,
or the chip used in the second node sends information to another network element (or
an entity or a node).
[0350] When the communication apparatus is a chip used in a fourth node, the chip implements
a function of the fourth node in the foregoing method embodiment. The chip receives
information from another network element, or the chip sends information to another
network element (or an entity or a node).
[0351] When the communication apparatus is a chip used in a fifth node, the chip implements
a function of the fifth node in the foregoing method embodiment. The chip receives
information from another network element, or the chip sends information to another
network element (or an entity or a node).
[0352] When the communication apparatus is a chip used in a sixth node, the chip implements
a function of the sixth node in the foregoing method embodiment. The chip receives
information from another network element, or the chip sends information to another
network element (or an entity or a node).
[0353] It may be understood that the processor in embodiments of this application may be
a CPU, or may be another general-purpose processor, a digital signal processor (digital
signal processor, DSP), an application-specific integrated circuit (application-specific
integrated circuit, ASIC), a field programmable gate array (field programmable gate
array, FPGA), another programmable logic device, a transistor logic device, a hardware
component, or any combination thereof. The genera-purpose processor may be a microprocessor
or any regular processor.
[0354] The method steps in embodiments of this application may be implemented by using hardware,
or may be implemented by the processor executing software instructions. The software
instructions may include a corresponding software module. The software module may
be stored in a random access memory (random access memory, RAM), a flash memory, a
read-only memory (Read-Only Memory, ROM), a programmable read-only memory (programmable
ROM, PROM), an erasable programmable read-only memory (erasable PROM, EPROM), an electrically
erasable programmable read-only memory (electrically EPROM, EEPROM), a register, a
hard disk, a removable hard disk, a CD-ROM, or any other form of storage medium well-known
in the art. For example, a storage medium is coupled to a processor, so that the processor
can read information from the storage medium, and can write information to the storage
medium. Certainly, the storage medium may alternatively be a component of the processor.
The processor and the storage medium may be disposed in an ASIC. In addition, the
ASIC may be located in the LAF, the first node, the second node, the fourth node,
the fifth node, or the sixth node. Certainly, the processor and the storage medium
may alternatively exist as discrete components in the LAF, the first node, the second
node, the fourth node, the fifth node, or the sixth node.
[0355] All or some of the foregoing embodiments may be implemented by using software, hardware,
firmware, or any combination thereof. When the software is used to implement embodiments,
all or some of embodiments may be implemented in a form of a computer program product.
The computer program product includes one or more computer programs or instructions.
When the computer programs or the instructions are loaded and executed on a computer,
the procedures or functions according to embodiments of this application are all or
partially generated. The computer may be a general-purpose computer, a dedicated computer,
a computer network, or another programmable apparatus. The computer programs or the
instructions may be stored in a computer-readable storage medium, or may be communicated
by using the computer-readable storage medium. The computer-readable storage medium
may be any usable medium accessible by the computer, or a data storage device, for
example, a server, integrating one or more usable media. The usable medium may be
a magnetic medium, for example, a floppy disk, a hard disk, or a magnetic tape; may
be an optical medium, for example, a digital versatile disc (digital versatile disc,
DVD); or may be a semiconductor medium, for example, a solid-state drive (solid-state
drive, SSD).
[0356] In various embodiments of this application, unless otherwise stated or there is a
logic conflict, terms and/or descriptions in different embodiments are consistent
and may be mutually referenced, and technical features in different embodiments may
be combined based on an internal logical relationship thereof, to form a new embodiment.
[0357] It may be understood that various numbers in embodiments of this application are
used for differentiation merely for ease of description, but are not for limiting
the scope of embodiments of this application. Sequence numbers of the foregoing processes
do not mean an execution sequence, and the execution sequence of the processes should
be determined based on functions and internal logic of the processes.
[0358] An embodiment of this application further provides a computer-readable storage medium.
The computer-readable storage medium stores computer-executable instructions. When
the computer-executable instructions are executed, the method performed by the LAF,
the first node, the second node, the fourth node, the fifth node, or the sixth node
in the foregoing method embodiment is enabled to be implemented.
[0359] An embodiment of this application further provides a computer program product. The
computer program product includes a computer program. When the computer program is
executed, the method performed by the LAF, the first node, the second node, the fourth
node, the fifth node, or the sixth node in the foregoing method embodiment is enabled
to be implemented.
[0360] An embodiment of this application further provides a communication system. The communication
system includes a LAF or one or more nodes in a first node, a second node, a fourth
node, a fifth node, a sixth node, or the like. The LAF is configured to perform the
method performed by the LAF in the foregoing method embodiment. The first node is
configured to perform the method performed by the first node in the foregoing method
embodiment. The second node is configured to perform the method performed by the second
node in the foregoing method embodiment. The fourth node is configured to perform
the method performed by the fourth node in the foregoing method embodiment. The fifth
node is configured to perform the method performed by the fifth node in the foregoing
method embodiment. The sixth node is configured to perform the method performed by
the sixth node in the foregoing method embodiment.
[0361] It should be noted that, for brief description, the foregoing method embodiments
are all expressed as a series of actions. However, persons skilled in the art should
appreciate that this application is not limited to the order of the actions, because
according to this application, some steps may be performed in other orders or simultaneously.
Persons skilled in the art should also know that embodiments described in this specification
are all example embodiments, and the related actions and modules are not necessarily
needed by this application.
[0362] Descriptions of embodiments provided in this application may refer to each other,
and the descriptions of embodiments have respective focuses. For a part that is not
described in detail in an embodiment, refer to related descriptions in another embodiment.
For ease of description and brevity, for example, for functions of the apparatuses
and devices provided in embodiments of this application and performed steps, refer
to the related descriptions in the method embodiments of this application. The method
embodiments and the apparatus embodiments may also be mutually referenced, combined,
or cited.
[0363] Finally, it should be noted that the foregoing embodiments are merely for describing
the technical solutions in this application but not for limiting this application.
Although this application is described in detail with reference to the foregoing embodiments,
persons of ordinary skill in the art should understand that they may still make modifications
to the technical solutions recorded in the foregoing embodiments or make equivalent
replacements to some or all technical features thereof, and these modifications or
replacements do not make essence of the corresponding technical solutions depart from
the scope of the technical solutions in embodiments of this application.
1. A blockchain creation method, wherein the method is applied to a ledger anchor function
LAF, and comprises:
sending a first message to at least one first node, wherein the first message is for
configuring the first node to be a blockchain node, a type of the first node comprises
at least one of the following: a terminal device, an access network device, a core
network element, an independent node, an application function node, and an edge network
node, and the terminal device, the access network device, the core network element,
the independent node, the application function node, and the edge network node are
nodes having a blockchain capability in a communication network; and
receiving a first indication message from the at least one first node, wherein the
first indication message indicates whether the first node is successfully configured.
2. The method according to claim 1, wherein the method further comprises:
receiving blockchain establishment requirement information from a second node; and
the sending a first message to at least one first node comprises:
sending the first message to the at least one first node based on the blockchain establishment
requirement information.
3. The method according to claim 2, wherein the blockchain establishment requirement
information comprises one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
4. The method according to claim 3, wherein the blockchain establishment requirement
information comprises the policy information; and
the sending the first message to the at least one first node based on the blockchain
establishment requirement information comprises:
obtaining identification information of a network element in which the first node
is located, address information of the first node, or identification information of
the first node based on the policy information; and
sending the first message to the at least one first node based on the identification
information of the network element in which the first node is located, the address
information of the first node, or the identification information of the first node.
5. The method according to claim 4, wherein the obtaining identification information
of a network element in which the first node is located, address information of the
first node, or identification information of the first node based on the policy information
comprises:
sending a first query request to a fourth node, wherein the first query request comprises
the policy information; and
receiving a first response message from the fourth node, wherein the first response
message comprises the identification information of the network element in which the
first node is located, the address information of the first node, or the identification
information of the first node.
6. The method according to claim 3, wherein the blockchain establishment requirement
information comprises the identification information of the first node; and
the sending the first message to the at least one first node based on the blockchain
establishment requirement information comprises:
sending the first message to the at least one first node based on the identification
information of the first node.
7. The method according to claim 4 or 6, wherein the sending the first message to the
at least one first node based on the identification information of the first node
comprises:
obtaining the identification information of the network element in which the first
node is located or the address information of the first node based on the identification
information of the first node; and
sending the first message to the at least one first node based on the identification
information of the network element in which the first node is located or the address
information of the first node.
8. The method according to claim 7, wherein the obtaining the identification information
of the network element in which the first node is located or the address information
of the first node based on the identification information of the first node comprises:
sending a second query request to a fifth node, wherein the second query request comprises
the identification information of the first node; and
receiving a second response message from the fifth node, wherein the second response
message comprises the identification information of the network element in which the
first node is located or the address information of the first node.
9. The method according to claim 4, 5, 7 or 8, wherein the network element in which the
first node is located is an access and mobility management function AMF.
10. The method according to claim 5 or 8, wherein the type of the first node is the terminal
device; and the first response message comprises the identification information of
the first node, or the second response message comprises the identification information
of the network element in which the first node is located or the address information
of the first node; and
the fourth node is a policy control function PCF, or the fifth node is a unified data
management UDM.
11. The method according to claim 5 or 8, wherein the first response message comprises
the identification information of the network element in which the first node is located
or the address information of the first node, and the second response message comprises
the identification information of the network element in which the first node is located
or the address information of the first node; and
the type of the first node is the access network device, and the fourth node or the
fifth node is an operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node or the
fifth node is a network repository function NRF; or
the type of the first node is the application function node, and the fourth node or
the fifth node is a network exposure function NEF.
12. The method according to any one of claims 2 to 11, wherein the method further comprises:
sending a blockchain establishment result to the second node based on the first indication
message from the at least one first node.
13. The method according to claim 12, wherein the sending a blockchain establishment result
to the second node based on the first indication message from the at least one first
node comprises:
sending the blockchain establishment result and a blockchain establishment log to
the second node based on the first indication message from the at least one first
node, wherein
the blockchain establishment log comprises a requirement completion status.
14. The method according to claim 12 or 13, wherein the first indication message comprises
configuration success information or configuration failure information, and the blockchain
establishment result comprises a blockchain establishment success or a blockchain
establishment failure; and
the sending a blockchain establishment result to the second node based on the first
indication message from the at least one first node comprises:
sending the blockchain establishment result to the second node based on an amount
of configuration success information comprised in the first indication message from
the at least one first node.
15. The method according to claim 14, wherein
if the amount of configuration success information is greater than or equal to a first
quantity threshold, the blockchain establishment result is the blockchain establishment
success; or
if the amount of configuration success information is less than a first quantity threshold,
the blockchain establishment result is the blockchain establishment failure.
16. The method according to any one of claims 1 to 15, wherein the method further comprises:
receiving blockchain capability information of a plurality of nodes, wherein the plurality
of nodes comprise the at least one first node.
17. The method according to claim 16, wherein the method further comprises:
storing the blockchain capability information of the plurality of nodes; or
sending the blockchain capability information of the plurality of nodes to a sixth
node.
18. The method according to claim 16 or 17, wherein the blockchain capability information
comprises a mode supported by the node, and the mode comprises one or more of the
following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, wherein
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, wherein the preprocessing the transaction or the transaction proposal comprises
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock comprises one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode comprises a function of the node in the light-node mode,
and is configured to store the complete block.
19. The method according to claim 18, wherein
the node in the client mode and the node in the micronode mode comprise at least one
of the following capabilities: a smart-contract deployment, invoking, or execution
capability, a transaction reporting, querying, or execution capability, a block querying
capability, a computing capability, a storage capability, a network capability, a
security algorithm capability, and a trusted-execution-environment provision capability;
and
the node in the light-node mode and the node in the full-node mode comprise at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
20. The method according to claim 16 or 17, wherein the blockchain capability information
comprises at least one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
21. The method according to any one of claims 1 to 20, wherein the method further comprises:
sending a second message to a third node, wherein the third node is a successfully
configured node in the at least one first node, and the second message is for canceling
the third node serving as the blockchain node; and
receiving a second indication message from the third node, wherein the second indication
message indicates whether the third node is successfully canceled.
22. A blockchain creation method, comprising:
receiving, by a first node, a first message, wherein the first message is for configuring
the first node to be a blockchain node, a type of the first node comprises at least
one of the following: a terminal device, an access network device, a core network
element, an independent node, an application function node, and an edge network node,
and the terminal device, the access network device, the core network element, the
independent node, the application function node, and the edge network node are nodes
having a blockchain capability in a communication network; and
sending, by the first node, a first indication message, wherein the first indication
message indicates whether the first node is successfully configured.
23. The method according to claim 22, wherein the method further comprises:
sending, by the first node, blockchain capability information.
24. The method according to claim 23, wherein the blockchain capability information comprises
a mode supported by the node, and the mode comprises one or more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, wherein
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, wherein the preprocessing the transaction or the transaction proposal comprises
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock comprises one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode comprises a function of the node in the light-node mode,
and is configured to store the complete block.
25. The method according to claim 24, wherein
the node in the client mode and the node in the micronode mode comprise at least one
of the following capabilities: a smart-contract deployment, invoking, or execution
capability, a transaction reporting, querying, or execution capability, a block querying
capability, a computing capability, a storage capability, a network capability, a
security algorithm capability, and a trusted-execution-environment provision capability;
and
the node in the light-node mode and the node in the full-node mode comprise at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
26. The method according to claim 23, wherein the blockchain capability information comprises
at least one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
27. The method according to any one of claims 21 to 26, wherein the first indication message
indicates that the first node is successfully configured; and
the method further comprises:
receiving a second message, wherein the second message is for canceling the first
node serving as the blockchain node; and
sending a second indication message, wherein the second indication message indicates
whether the first node is successfully canceled.
28. A communication apparatus, comprising a unit or a module configured to perform the
method according to any one of claims 1 to 21, or comprising a unit or a module configured
to perform the method according to any one of claims 22 to 27.
29. A communication apparatus, comprising:
one or more processors, one or more transceivers, and one or more memories, wherein
the one or more memories are configured to store a computer program, and the one or
more processors and the one or more transceivers are configured to execute the computer
program stored in the one or more memories, to enable the communication apparatus
to perform the method according to any one of claims 1 to 21 or claims 22 to 27.
30. A computer-readable storage medium, wherein the storage medium stores a computer program
or instructions; and when the computer program or the instructions are executed by
a computer, the method according to any one of claims 1 to 21 or claims 22 to 27 is
implemented.
31. A computer program product, comprising computer program code, wherein when the computer
program code is run on a computer, the method according to any one of claims 1 to
21 or claims 22 to 27 is implemented.
32. A communication system, wherein the communication system comprises a ledger anchor
function LAF and at least one first node, wherein
the LAF is configured to send a first message to the at least one first node, wherein
the first message is for configuring the first node to be a blockchain node, a type
of the first node comprises at least one of the following: a terminal device, an access
network device, a core network element, an independent node, an application function
node, and an edge network node, and the terminal device, the access network device,
the core network element, the independent node, the application function node, and
the edge network node are nodes having a blockchain capability in a communication
network; and
the at least one first node is configured to send a first indication message to the
LAF, wherein the first indication message indicates whether the first node for sending
the first indication information is successfully configured.
33. The communication system according to claim 32, wherein the communication system further
comprises a second node, wherein
the second node is configured to send blockchain establishment requirement information
to the LAF; and
that the LAF is configured to send a first message to the at least one first node
comprises:
the LAF is configured to send the first message to the at least one first node based
on the blockchain establishment requirement information.
34. The communication system according to claim 33, wherein the blockchain establishment
requirement information comprises one or more of the following requirements:
a blockchain structure, a block structure, a consensus mechanism, a throughput requirement,
whether a blockchain supports an editing function, an access control policy for the
blockchain, a quantity of first nodes, policy information, identification information
of the first node, a capability of the first node, the type of the first node, a mode
supported by the first node, configuration information corresponding to the first
node, and whether the first node is capable of providing a trusted execution environment
for running of the blockchain.
35. The communication system according to claim 34, wherein the blockchain establishment
requirement information comprises the policy information or the identification information
of the first node, and the communication system further comprises a fourth node; and
that the LAF is configured to send the first message to the at least one first node
based on the blockchain establishment requirement information comprises:
the LAF is configured to send a first query request to the fourth node, wherein the
first query request comprises the policy information, or the first query request comprises
the identification information of the first node;
the fourth node is configured to send a first response message to the LAF, wherein
when the first query request comprises the policy information, the first response
message comprises identification information of a network element in which the first
node is located, address information of the first node, or the identification information
of the first node; or when the first query request comprises the identification information
of the first node, the first response message comprises identification information
of a network element in which the first node is located or address information of
the first node; and
the LAF is configured to send the first message to the at least one first node based
on the identification information of the network element in which the first node is
located, the address information of the first node, or the identification information
of the first node.
36. The communication system according to claim 35, wherein the network element in which
the first node is located is an access and mobility management function AMF.
37. The communication system according to claim 35 or 36, wherein the type of the first
node is the terminal device, the first query request comprises the policy information,
the first response message comprises the identification information of the first node,
and the fourth node is a policy control function PCF.
38. The communication system according to claim 35 or 36, wherein the type of the first
node is the terminal device, the first query request comprises the identification
information of the first node, the first response message comprises the identification
information of the network element in which the first node is located or the address
information of the first node, and the fourth node is a unified data management UDM.
39. The communication system according to claim 35, wherein the first response message
comprises the identification information of the network element in which the first
node is located or the address information of the first node; and
the type of the first node is the access network device, and the fourth node is an
operations, administration and maintenance OAM;
the type of the first node is the core network element, and the fourth node is a network
repository function NRF; or
the type of the first node is the application function node, and the fourth node is
a network exposure function NEF.
40. The communication system according to any one of claims 33 to 39, wherein
the LAF is configured to send a blockchain establishment result to the second node
based on the first indication message from the at least one first node; or
the LAF is configured to send a blockchain establishment result and a blockchain establishment
log to the second node based on the first indication message from the at least one
first node, wherein the blockchain establishment log comprises a requirement completion
status.
41. The communication system according to claim 40, wherein the first indication message
comprises configuration success information or configuration failure information,
and the blockchain establishment result comprises a blockchain establishment success
or a blockchain establishment failure; and
that the LAF is configured to send a blockchain establishment result to the second
node based on the first indication message from the at least one first node comprises:
the LAF is configured to send the blockchain establishment result to the second node
based on an amount of configuration success information comprised in the first indication
message from the at least one first node.
42. The communication system according to claim 41, wherein if the amount of configuration
success information is greater than or equal to a first quantity threshold, the blockchain
establishment result is the blockchain establishment success; or
if the amount of configuration success information is less than a first quantity threshold,
the blockchain establishment result is the blockchain establishment failure.
43. The communication system according to any one of claims 32 to 42, wherein the at least
one first node is further configured to:
send blockchain capability information to the LAF.
44. The communication system according to claim 43, wherein
the LAF is further configured to store the blockchain capability information; or
the LAF is further configured to send the blockchain capability information to the
fourth node; and
the fourth node stores the blockchain capability information.
45. The communication system according to claim 43 or 44, wherein the blockchain capability
information comprises a mode supported by the node, and the mode comprises one or
more of the following:
a client mode, a micronode mode, a light-node mode, and a full-node mode, wherein
a node in the client mode is configured to generate a transaction or a transaction
proposal;
a node in the micronode mode is configured to preprocess the transaction or the transaction
proposal, wherein the preprocessing the transaction or the transaction proposal comprises
one or more of the following: verifying the transaction or the transaction proposal;
executing the transaction proposal to generate the transaction; and generating a microblock
based on the transaction;
a node in the light-node mode is configured to process the transaction, the transaction
proposal, or the microblock, and the processing the transaction, the transaction proposal,
or the microblock comprises one or more of the following: verifying the transaction
or the transaction proposal; executing the transaction proposal to generate the transaction;
and reaching a consensus on the transaction or the microblock, and generating a complete
block based on the transaction or the microblock; and
a node in the full-node mode comprises a function of the node in the light-node mode,
and is configured to store the complete block.
46. The communication system according to claim 45, wherein the node in the client mode
and the node in the micronode mode comprise at least one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, and a
trusted-execution-environment provision capability; and
the node in the light-node mode and the node in the full-node mode comprise at least
one of the following capabilities: the smart-contract deployment, invoking, or execution
capability, the transaction reporting, querying, or execution capability, the block
querying capability, the computing capability, the storage capability, the network
capability, the security algorithm capability, the trusted-execution-environment provision
capability, and a consensus capability.
47. The communication system according to claim 43 or 44, wherein the blockchain capability
information comprises at least one of the following capabilities:
a smart-contract deployment, invoking, or execution capability, a transaction reporting,
querying, or execution capability, a block querying capability, a computing capability,
a storage capability, a network capability, a security algorithm capability, a trusted-execution-environment
provision capability, and a consensus capability.
48. The communication system according to any one of claims 32 to 47, wherein
the LAF is configured to send a second message to a third node, wherein the third
node is a successfully configured node in the at least one first node, and the second
message is for canceling the third node serving as the blockchain node; and
the third node is configured to send a second indication message to the LAF, wherein
the second indication message indicates whether the third node is successfully canceled.